#47042 [Opn]: php cgi sapi is incorrectly removing the SCRIPT_FILENAME for non apache

2009-03-03 Thread sriram dot natarajan at sun dot com
 ID:   47042
 User updated by:  sriram dot natarajan at sun dot com
 Reported By:  sriram dot natarajan at sun dot com
 Status:   Open
 Bug Type: CGI related
 Operating System: linux , solaris
 PHP Version:  5.2.9
 New Comment:

i have tested this patch with apache 2.0 and 2.2 configurations within
cgi and was able to get applications like joomla working fine.

can some one kindly look into the attached patch and provide your
feedback

thanks


Previous Comments:


[2009-02-28 09:18:55] sriram dot natarajan at sun dot com

Hi
 php cgi module assumes that if redirect_uri is set , the request must
be from apache and throws away the script_name value and assigns
path_translated value to script name. 
 
 this is because, in cgi environment, apache sets the SCRIPT_NAME to
the location of the php-cgi binary and keeping the PATH_INFO variable to
point to the requested php script. this is very unique only to apache. 

 this crude test condition for apache is affecting sun web server
executing in fastcgi mode where in it looses the script_name value and
ends up returning with 'no input file specified'. 

 this happens only for sun web server and not for lighttpd because
lighttpd does not set redirect_uri when requested for index.php. 

 based on this analysis , earlier, i provided a patch to address this
issue . however, i overlooked the obvious and ended up breaking apache
in cgi mode. 

 because of this, a separate bug : http://bugs.php.net/bug.php?id=47149
has been filed and my suggested patch was reverted.

my sincere apology on providing this obviously broken patch and wasting
some of your time.

 pl. find attached a below patch that should do the right thing.
what we want to do is 

a) compare whether the script path is different from path translated
since we know that apache by default sets the script name to point to
the location of cgi binary and not the requested uri

[sn123...@samp]'php5'>diff -u php-5.2.9/sapi/cgi/cgi_main.c.ORIG
php-5.2.9/sapi/cgi/cgi_main.c
--- php-5.2.9/sapi/cgi/cgi_main.c.ORIG  Sat Feb 28 00:44:54 2009
+++ php-5.2.9/sapi/cgi/cgi_main.c   Sat Feb 28 00:46:00 2009
@@ -961,7 +961,8 @@
}

if (env_path_translated != NULL &&
env_redirect_url != NULL &&
-   orig_script_filename != NULL &&
script_path_translated != NULL) {
+   env_path_translated !=
script_path_translated &&
+   strcmp(env_path_translated,
script_path_translated) != 0) {
/* 
   pretty much apache specific.  If we
have a redirect_url
   then our script_filename and
script_name point to the



[2009-01-11 11:13:02] d...@php.net

This bug has been fixed in CVS.

Snapshots of the sources are packaged every three hours; this change
will be in the next snapshot. You can grab the snapshot at
http://snaps.php.net/.
 
Thank you for the report, and for helping us make PHP better.





[2009-01-08 22:19:12] sriram dot natarajan at sun dot com

previous patch had whitespaces instead of tabs causing the patch to
appear distorted. 

posting a same patch with this issue addressed
--- sapi/cgi/cgi_main.c.ORIGThu Jan  8 14:18:25 2009
+++ sapi/cgi/cgi_main.c Thu Jan  8 14:18:31 2009
@@ -960,7 +960,9 @@
TRANSLATE_SLASHES(env_document_root);
}
 
-   if (env_path_translated != NULL &&
env_redirect_url != NULL) {
+   if (env_path_translated != NULL &&
env_redirect_url != NULL && 
+   orig_script_filename != NULL &&
script_path_translated != NULL &&
+   strcmp(orig_script_filename,
script_path_translated) != 0) {
/* 
   pretty much apache specific.  If we
have a redirect_url
   then our script_filename and
script_name point to the



[2009-01-08 20:06:25] sriram dot natarajan at sun dot com

here is the suggested patch to address this issue

--- sapi/cgi/cgi_main.c.ORIGWed Jan  7 07:10:14 2009
+++ sapi/cgi/cgi_main.c Wed Jan  7 19:37:21 2009
@@ -960,16 +960,18 @@
TRANSLATE_SLASHES(env_document_root);
}
 
-   if (env_path_translated != NULL &&
env_redirect_url != NULL) {
-   /* 
-  pretty much apache specific.  If we
have a redirect_url
-  then our script_filename and
script_name point to t

#47550 [NEW]: mysql_real_escape_strings_set()

2009-03-03 Thread alexander at vourtsis dot com
From: alexander at vourtsis dot com
Operating system: Windows Linux OSX
PHP version:  5.3.0beta1
PHP Bug Type: *Database Functions
Bug description:  mysql_real_escape_strings_set()

Description:

I'd want to suggest a function to switch escaping of input strings for an
sql query.

So far escaping occurs by the use of mysql_real_escape_string(). Using
this for each variable can result into a clutter like,

mysql_real_escape_string($test1);
mysql_real_escape_string($test2);
mysql_real_escape_string($test3);
mysql_real_escape_string($test4);

I suggest to create a function to turn real escape string on and off
like,

mysql_real_escape_strings_set(1);
and to get if escaping is on:
mysql_real_escape_strings_get();

Thank you in Advance,

Reproduce code:
---
---
>From manual page: function.mysql-real-escape-string
---



-- 
Edit bug report at http://bugs.php.net/?id=47550&edit=1
-- 
Try a CVS snapshot (PHP 5.2):
http://bugs.php.net/fix.php?id=47550&r=trysnapshot52
Try a CVS snapshot (PHP 5.3):
http://bugs.php.net/fix.php?id=47550&r=trysnapshot53
Try a CVS snapshot (PHP 6.0):
http://bugs.php.net/fix.php?id=47550&r=trysnapshot60
Fixed in CVS:
http://bugs.php.net/fix.php?id=47550&r=fixedcvs
Fixed in CVS and need be documented: 
http://bugs.php.net/fix.php?id=47550&r=needdocs
Fixed in release:
http://bugs.php.net/fix.php?id=47550&r=alreadyfixed
Need backtrace:  
http://bugs.php.net/fix.php?id=47550&r=needtrace
Need Reproduce Script:   
http://bugs.php.net/fix.php?id=47550&r=needscript
Try newer version:   
http://bugs.php.net/fix.php?id=47550&r=oldversion
Not developer issue: 
http://bugs.php.net/fix.php?id=47550&r=support
Expected behavior:   
http://bugs.php.net/fix.php?id=47550&r=notwrong
Not enough info: 
http://bugs.php.net/fix.php?id=47550&r=notenoughinfo
Submitted twice: 
http://bugs.php.net/fix.php?id=47550&r=submittedtwice
register_globals:
http://bugs.php.net/fix.php?id=47550&r=globals
PHP 4 support discontinued:  http://bugs.php.net/fix.php?id=47550&r=php4
Daylight Savings:http://bugs.php.net/fix.php?id=47550&r=dst
IIS Stability:   
http://bugs.php.net/fix.php?id=47550&r=isapi
Install GNU Sed: 
http://bugs.php.net/fix.php?id=47550&r=gnused
Floating point limitations:  
http://bugs.php.net/fix.php?id=47550&r=float
No Zend Extensions:  
http://bugs.php.net/fix.php?id=47550&r=nozend
MySQL Configuration Error:   
http://bugs.php.net/fix.php?id=47550&r=mysqlcfg



#47539 [Opn]: MySQL module slow close

2009-03-03 Thread ian at ianhobson dot co dot uk
 ID:   47539
 User updated by:  ian at ianhobson dot co dot uk
 Reported By:  ian at ianhobson dot co dot uk
 Status:   Open
 Bug Type: MySQL related
 Operating System: win32 only -Win2K
 PHP Version:  5.2.9
 New Comment:

It looks as if this bug has been around since 5.2.2

See bugs 41968 and 41350.


Previous Comments:


[2009-03-02 10:46:33] ian at ianhobson dot co dot uk

I am fairly sure it is. I recall renaming the MySQL version
(libmySQL.dll.save is still in the MySQL directory), and copy/pasting
the php version in. 

All three copies of that file on my machine... 

a) Do not have any version information in the properties box.
b) Are sized exactly 2076672 bytes. 
c) Are dated when I installed php and mySQl (except one which is dated
the date I unpacked php5.2.9)

The pathnames are
  D:\wamp\bin\php\php5.2.8 php 5.2.8
  D:\wamp\bin\mysql\mysql5.1.30\binMySQl 5.1.30 
  D:\test  php 5.2.9 

libmySQL.dll.save is sized at 2,260,992 bytes



[2009-03-02 09:26:54] johan...@php.net

Which libmysql.dll is being used? The one which is part of the PHP
distribution?



[2009-03-01 21:55:16] ian at ianhobson dot co dot uk

Description:

If php_mysql.dll or php_mysqli.dll are enabled, the CLI takes 5 seconds
to close. 

Reproduce code:
---
@echo off
time phpx
The current time is: 21:50:50.39
Enter the new time:
HiThe current time is: 21:50:55.44
Enter the new time:

D:\Websites\ppg\testsop\tests>

The times differ by over 5 seconds. Windows, AMD 3500+, with 3GB RAM
and fast hard disk. 







-- 
Edit this bug report at http://bugs.php.net/?id=47539&edit=1



#40479 [Com]: zend_mm_heap corrupted

2009-03-03 Thread hakan dot koseoglu at gmail dot com
 ID:   40479
 Comment by:   hakan dot koseoglu at gmail dot com
 Reported By:  rrossi at maggioli dot it
 Status:   No Feedback
 Bug Type: Reproducible crash
 Operating System: Suse Linux 9.0
 PHP Version:  5.2.1
 New Comment:

The same problem appears from a allegedly successful compilation op PHP
5.2.9 on RHEL5 64 bit using -m32 CFLAG so that the binaries are 32 bit.

The compilation appears to complete successfully:


Apache 2.0.59 compiled w/o any problems with the following configure
and it works fine.
./configure --prefix=/apps/apache2 --with-expat=builtin

PHP is configured with the following options:
./configure --with-apxs2=/apps/apache2/bin/apxs
--build=i386-redhat-linux --with-pic --with-gd --with-zlib
--with-config-file-path=/apps/apache2/conf --with-libdir=/lib/
--enable-debug

And after the successful run, make test was run with the following
errors:

[Tue Mar  3 11:16:22 2009]  Script: 
'/apps/source/php-5.2.9/run-tests.php'
---
/apps/source/php-5.2.9/main/streams/plain_wrapper.c(421) : Block
0x08c71270 status:
Beginning:  OK (allocated on
/apps/source/php-5.2.9/main/streams/plain_wrapper.c:144, 108 bytes)
Start:  OK
  End:  Overflown (magic=0x instead of 0xD03365E6)
At least 4 bytes overflown
---
[Tue Mar  3 11:16:22 2009]  Script: 
'/apps/source/php-5.2.9/run-test-info.php'
---
/apps/source/php-5.2.9/main/streams/plain_wrapper.c(421) : Block
0x097cdd80 status:
Beginning:  OK (allocated on
/apps/source/php-5.2.9/main/streams/plain_wrapper.c:160, 108 bytes)
Start:  OK
  End:  Overflown (magic=0x instead of 0x512474AC)
At least 4 bytes overflown
---
[Tue Mar  3 11:16:22 2009]  Script: 
'/apps/source/php-5.2.9/run-test-info.php'
---
/apps/source/php-5.2.9/main/streams/plain_wrapper.c(421) : Block
0x097cdb78 status:
Beginning:  OK (allocated on
/apps/source/php-5.2.9/main/streams/plain_wrapper.c:160, 108 bytes)
Start:  OK
  End:  Overflown (magic=0x instead of 0x512474AC)
At least 4 bytes overflown
---
[Tue Mar  3 11:16:22 2009]  Script: 
'/apps/source/php-5.2.9/run-test-info.php'
---
/apps/source/php-5.2.9/main/streams/plain_wrapper.c(421) : Block
0x097cd9ac status:
Beginning:  OK (allocated on
/apps/source/php-5.2.9/main/streams/plain_wrapper.c:160, 108 bytes)
Start:  OK
  End:  Overflown (magic=0x instead of 0x512474AC)
At least 4 bytes overflown
---
[Tue Mar  3 11:16:22 2009]  Script: 
'/apps/source/php-5.2.9/run-test-info.php'
/apps/source/php-5.2.9/main/streams/plain_wrapper.c(160) :  Freeing
0x097CD9AC (108 bytes), script=/apps/source/php-5.2.9/run-test-info
.php
/apps/source/php-5.2.9/ext/standard/php_fopen_wrapper.c(312) : Actual
location (location was relayed)
Last leak repeated 2 times
=== Total 3 memory leaks detected ===
[Tue Mar  3 11:16:22 2009]  Script: 
'/apps/source/php-5.2.9/run-tests.php'
---
/apps/source/php-5.2.9/main/streams/plain_wrapper.c(421) : Block
0x08c734c4 status:
Beginning:  OK (allocated on
/apps/source/php-5.2.9/main/streams/plain_wrapper.c:292, 108 bytes)
Start:  OK
  End:  Overflown (magic=0x instead of 0xD03365E6)
At least 4 bytes overflown
---
[Tue Mar  3 11:16:22 2009]  Script:  '-'
---
/apps/source/php-5.2.9/main/streams/plain_wrapper.c(421) : Block
0x086d7038 status:
Beginning:  OK (allocated on
/apps/source/php-5.2.9/main/streams/plain_wrapper.c:160, 108 bytes)
Start:  OK
  End:  Overflown (magic=0x instead of 0x4C780131)
At least 4 bytes overflown
---
[Tue Mar  3 11:16:22 2009]  Script:  '-'
---
/apps/source/php-5.2.9/main/streams/plain_wrapper.c(421) : Block
0x086d6e30 status:
Beginning:  OK (allocated on
/apps/source/php-5.2.9/main/streams/plain_wrapper.c:160, 108 bytes)
Start:  OK
  End:  Overflown (magic=0x instead of 0x4C780131)
At least 4 bytes overflown
---
[Tue Mar  3 11:16:22 2009]  Script:  '-'
---
/apps/source/php-5.2.9/main/streams/plain_wrapper.c(421) : Block
0x086d6c64 status:
Beginning:  OK (allocated on
/apps/source/php-5.2.9/main/streams/plain_wrapper.c:160, 108 bytes)
Start:  OK
  End:  Overflown (magic=0x instead of 0x4C780131)
At least 4 bytes overflown
---
[Tue Mar  3 11:16:22 2009]

#47546 [Opn->Csd]: Default value for limit parameter in explode is 0, not -1

2009-03-03 Thread kalle
 ID:   47546
 Updated by:   ka...@php.net
 Reported By:  jordi dot salvat at localbilinglimited dot com
-Status:   Open
+Status:   Closed
-Bug Type: Documentation problem
+Bug Type: Strings related
 Operating System: Irrelevant
-PHP Version:  Irrelevant
+PHP Version:  5.2.9
-Assigned To:  
+Assigned To:  kalle
 New Comment:

This bug has been fixed in the documentation's XML sources. Since the
online and downloadable versions of the documentation need some time
to get updated, we would like to ask you to be a bit patient.

Thank you for the report, and for helping us make our documentation
better.

This bug has been fixed in the documentation's XML sources. Since the
online and downloadable versions of the documentation need some time
to get updated, we would like to ask you to be a bit patient.

Thank you for the report, and for helping us make our documentation
better.

Fixed in PHP 5.2.10


Previous Comments:


[2009-03-02 17:25:26] jordi dot salvat at localbilinglimited dot com

Description:

http://es.php.net/explode declares that the default value for the 3rd
parameter of the explode function is -1.

The function, however, behaves differently when -1 is passed
explicitly.


Reproduce code:
---
php <<'__END__'

__END__


Expected result:

>From the documentation, I would expect to see the same result twice.

Actual result:
--
Array
(
[0] => one
[1] => two
[2] => three
[3] => four
)
Array
(
[0] => one
[1] => two
[2] => three
)






-- 
Edit this bug report at http://bugs.php.net/?id=47546&edit=1



#47520 [Bgs]: PHP segfaulted in preg_replace on processing long string

2009-03-03 Thread pahan at hubbitus dot spb dot su
 ID:   47520
 User updated by:  pahan at hubbitus dot spb dot su
 Reported By:  pahan at hubbitus dot spb dot su
 Status:   Bogus
 Bug Type: PCRE related
 Operating System: Linux
 PHP Version:  5.3.0beta1
 New Comment:

Problem in pcre library is a problem of pcre library.
BUT segmentation fault of PHP is a bug PHP itself in any case!!!

I can understand what it may be very hard to fix, but completely do not
understand why you mark it as Bogus!


Previous Comments:


[2009-03-03 01:40:03] il...@php.net

There is not much we can do about recursion limits other then suggest 
the lowering of the pcre.recursion_limit setting. The basic problem is

that PCRE library (not PHP) is eating up the system stack during 
recursion and subsequently crashes when it runs out of room.

This is not a PHP bug.



[2009-03-02 10:09:28] phpwnd at gmail dot com

I forgot to add that in my case, lowering the value the
pcre.recursion_limit INI setting make preg_* functions fail instead of
making PHP segfault.



[2009-03-02 10:01:52] phpwnd at gmail dot com

I'd like to add that you don't need such a complicated test case, you
can make preg_* segfault with just something like:

$str = str_repeat(' ', 2490);
preg_match('#(.)+#', $str);


On my computer, a 2490-chars string is long enough to make it segfaults
everytime. For some reason, 2489 chars will make it segfault only 1 out
of 5 runs and 2480 chars are perfectly fine. If I replace the regexp
with more capturing parenthesis such as #((.))+# that limit drops to
1500-or-so and that number decreases as the number of parenthesis
increases. Using non-capturing patterns such as #(?:.)+# doubles that
number.

Obviously, the bug is related to capturing patterns repetition,
assuming we're experiencing the same bug. I'll try to find a place where
to host a core dump.



[2009-02-28 09:00:02] pahan at hubbitus dot spb dot su

Very apologize for mistake.
I'm fix rights now, please recheck.



[2009-02-28 01:19:21] fel...@php.net

I cannot download the coredump file: "You don't have permission to
access /_temp/php-pcre-bug/2/core.10135 on this server."

Can you give us a backtrace?



The remainder of the comments for this report are too long. To view
the rest of the comments, please view the bug report online at
http://bugs.php.net/47520

-- 
Edit this bug report at http://bugs.php.net/?id=47520&edit=1



#44589 [Com]: pdo_oci crashes and aborts php script for LOB columns

2009-03-03 Thread simong at bluhalo dot com
 ID:   44589
 Comment by:   simong at bluhalo dot com
 Reported By:  s dot rost at ewerk dot com
 Status:   Assigned
 Bug Type: PDO related
 Operating System: Debian 2.6.18.dfsg.1-18etch1
 PHP Version:  5.2.5
 Assigned To:  cjorcl
 New Comment:

We are receiving the same segfault in PHP 5.2.8
This is our backtrace:

Program received signal SIGSEGV, Segmentation fault.
[Switching to Thread -1208256752 (LWP 8743)]
0x0324e96f in kghufree () from
/usr/lib/oracle/10.2.0.4/client/lib/libclntsh.so.10.1
(gdb) bt
#0  0x0324e96f in kghufree () from
/usr/lib/oracle/10.2.0.4/client/lib/libclntsh.so.10.1
#1  0x031eea1f in kohfrem () from
/usr/lib/oracle/10.2.0.4/client/lib/libclntsh.so.10.1
#2  0x031ee29c in kohfrr () from
/usr/lib/oracle/10.2.0.4/client/lib/libclntsh.so.10.1
#3  0x031eeca7 in kohfrw () from
/usr/lib/oracle/10.2.0.4/client/lib/libclntsh.so.10.1
#4  0x0308a438 in kollfrfn () from
/usr/lib/oracle/10.2.0.4/client/lib/libclntsh.so.10.1
#5  0x02b369f9 in kpufdesc () from
/usr/lib/oracle/10.2.0.4/client/lib/libclntsh.so.10.1
#6  0x02c079be in OCIDescriptorFree () from
/usr/lib/oracle/10.2.0.4/client/lib/libclntsh.so.10.1
#7  0x011e129c in oci_blob_close (stream=0xa11026c, close_handle=1) at
/root/php-5.2.8/ext/pdo_oci/oci_statement.c:652
#8  0x013626b1 in _php_stream_free (stream=0xa11026c,
close_options=56830048) at /root/php-5.2.8/main/streams/streams.c:350
#9  0x013628db in stream_resource_regular_dtor (rsrc=0xa1102f0) at
/root/php-5.2.8/main/streams/streams.c:1371
#10 0x0139bc22 in list_entry_destructor (ptr=0xa1102f0) at
/root/php-5.2.8/Zend/zend_list.c:184
#11 0x0139a16d in zend_hash_del_key_or_index (ht=0x151f720,
arKey=0xa12cd , nKeyLength=0, h=173,
flag=1) at /root/php-5.2.8/Zend/zend_hash.c:497
#12 0x0139be6c in _zend_list_delete (id=173) at
/root/php-5.2.8/Zend/zend_list.c:58
#13 0x0138321f in _zval_ptr_dtor (zval_ptr=0xa110a58) at
/root/php-5.2.8/Zend/zend_variables.h:35
#14 0x013993e6 in zend_hash_destroy (ht=0xa110b94) at
/root/php-5.2.8/Zend/zend_hash.c:526
#15 0x0138f2c5 in _zval_dtor_func (zvalue=0xa1107bc) at
/root/php-5.2.8/Zend/zend_variables.c:43
#16 0x0138321f in _zval_ptr_dtor (zval_ptr=0xa10f97c) at
/root/php-5.2.8/Zend/zend_variables.h:35
#17 0x013993e6 in zend_hash_destroy (ht=0xa11051c) at
/root/php-5.2.8/Zend/zend_hash.c:526
#18 0x013a7f73 in zend_object_std_dtor (object=0xa1104f0) at
/root/php-5.2.8/Zend/zend_objects.c:45
#19 0x013a7fa2 in zend_objects_free_object_storage (object=0xa1104f0)
at /root/php-5.2.8/Zend/zend_objects.c:122
#20 0x013ab2a9 in zend_objects_store_del_ref_by_handle (handle=156) at
/root/php-5.2.8/Zend/zend_objects_API.c:206
#21 0x013ab2e8 in zend_objects_store_del_ref (zobject=0xa110504) at
/root/php-5.2.8/Zend/zend_objects_API.c:168
#22 0x0138321f in _zval_ptr_dtor (zval_ptr=0xa110cec) at
/root/php-5.2.8/Zend/zend_variables.h:35
#23 0x013993e6 in zend_hash_destroy (ht=0xa10fb88) at
/root/php-5.2.8/Zend/zend_hash.c:526
#24 0x0138f2c5 in _zval_dtor_func (zvalue=0xa10fd88) at
/root/php-5.2.8/Zend/zend_variables.c:43
#25 0x0138321f in _zval_ptr_dtor (zval_ptr=0x9f22dd0) at
/root/php-5.2.8/Zend/zend_variables.h:35
#26 0x013993e6 in zend_hash_destroy (ht=0x9ee9718) at
/root/php-5.2.8/Zend/zend_hash.c:526
#27 0x013a7f73 in zend_object_std_dtor (object=0x9f1832c) at
/root/php-5.2.8/Zend/zend_objects.c:45
#28 0x013a7fa2 in zend_objects_free_object_storage (object=0x9f1832c)
at /root/php-5.2.8/Zend/zend_objects.c:122
#29 0x013ab2a9 in zend_objects_store_del_ref_by_handle (handle=118) at
/root/php-5.2.8/Zend/zend_objects_API.c:206
#30 0x013ab2e8 in zend_objects_store_del_ref (zobject=0x9f22c58) at
/root/php-5.2.8/Zend/zend_objects_API.c:168
#31 0x0138321f in _zval_ptr_dtor (zval_ptr=0x9e3bab4) at
/root/php-5.2.8/Zend/zend_variables.h:35
#32 0x013993e6 in zend_hash_destroy (ht=0x9e3b958) at
/root/php-5.2.8/Zend/zend_hash.c:526
#33 0x013a7f73 in zend_object_std_dtor (object=0x9dcf218) at
/root/php-5.2.8/Zend/zend_objects.c:45
#34 0x013a7fa2 in zend_objects_free_object_storage (object=0x9dcf218)
at /root/php-5.2.8/Zend/zend_objects.c:122
#35 0x013aaecd in zend_objects_store_free_object_storage
(objects=0x151f7c8) at /root/php-5.2.8/Zend/zend_objects_API.c:89
#36 0x01383a21 in shutdown_executor () at
/root/php-5.2.8/Zend/zend_execute_API.c:299
#37 0x0138f833 in zend_deactivate () at
/root/php-5.2.8/Zend/zend.c:860
#38 0x0134f6d7 in php_request_shutdown (dummy=0x0) at
/root/php-5.2.8/main/main.c:1492
#39 0x01409946 in php_handler (r=0x99ba468) at
/root/php-5.2.8/sapi/apache2handler/sapi_apache2.c:469
#40 0x0029c96d in ap_run_handler () from /usr/sbin/httpd
#41 0x002a0318 in ap_invoke_handler () from /usr/sbin/httpd
#42 0x002ac38e in ap_process_request () from /usr/sbin/httpd
#43 0x002a916f in ap_register_input_filter () from /usr/sbin/httpd
#44 0x002a483d in ap_run_process_connection () from /usr/sbin/httpd
#45 0x002a493c in ap_process_connection () from /usr/sbin/httpd
#46 0x002b0952 in ap_graceful_stop_signalled () from /usr/sb

#47551 [NEW]: Export zend_ini_scanner_get_lineno

2009-03-03 Thread dpatterson at dplhenterprises dot com
From: dpatterson at dplhenterprises dot com
Operating system: Windows
PHP version:  5.3.0beta1
PHP Bug Type: Feature/Change Request
Bug description:  Export zend_ini_scanner_get_lineno

Description:

It is not currently possible for an extension that calls
zend_ini_scanner_get_lineno() to be built shared under Windows.
This is because the zend_ini_scanner_get_lineno() symbol is not exported
via the ZEND_API macro.

Please modify zend_ini_scanner.h and zend_ini_scanner.c, adding ZEND_API
to the prototype and definition of the zend_ini_scanner_get_lineno()
function.

Thank you.


-- 
Edit bug report at http://bugs.php.net/?id=47551&edit=1
-- 
Try a CVS snapshot (PHP 5.2):
http://bugs.php.net/fix.php?id=47551&r=trysnapshot52
Try a CVS snapshot (PHP 5.3):
http://bugs.php.net/fix.php?id=47551&r=trysnapshot53
Try a CVS snapshot (PHP 6.0):
http://bugs.php.net/fix.php?id=47551&r=trysnapshot60
Fixed in CVS:
http://bugs.php.net/fix.php?id=47551&r=fixedcvs
Fixed in CVS and need be documented: 
http://bugs.php.net/fix.php?id=47551&r=needdocs
Fixed in release:
http://bugs.php.net/fix.php?id=47551&r=alreadyfixed
Need backtrace:  
http://bugs.php.net/fix.php?id=47551&r=needtrace
Need Reproduce Script:   
http://bugs.php.net/fix.php?id=47551&r=needscript
Try newer version:   
http://bugs.php.net/fix.php?id=47551&r=oldversion
Not developer issue: 
http://bugs.php.net/fix.php?id=47551&r=support
Expected behavior:   
http://bugs.php.net/fix.php?id=47551&r=notwrong
Not enough info: 
http://bugs.php.net/fix.php?id=47551&r=notenoughinfo
Submitted twice: 
http://bugs.php.net/fix.php?id=47551&r=submittedtwice
register_globals:
http://bugs.php.net/fix.php?id=47551&r=globals
PHP 4 support discontinued:  http://bugs.php.net/fix.php?id=47551&r=php4
Daylight Savings:http://bugs.php.net/fix.php?id=47551&r=dst
IIS Stability:   
http://bugs.php.net/fix.php?id=47551&r=isapi
Install GNU Sed: 
http://bugs.php.net/fix.php?id=47551&r=gnused
Floating point limitations:  
http://bugs.php.net/fix.php?id=47551&r=float
No Zend Extensions:  
http://bugs.php.net/fix.php?id=47551&r=nozend
MySQL Configuration Error:   
http://bugs.php.net/fix.php?id=47551&r=mysqlcfg



#47553 [NEW]: Problem with multi-dimensional $_FILES

2009-03-03 Thread david at olyeo dot co dot uk
From: david at olyeo dot co dot uk
Operating system: Ubuntu 8.04
PHP version:  5.2CVS-2009-03-03 (snap)
PHP Bug Type: Streams related
Bug description:  Problem with multi-dimensional $_FILES

Description:

Hi,

I am just working with multi-dimensional file uploads and they are not
coming out as expected, i.e. they are not coming out the same as a single
file upload. I don't see why this should be - why not just output all file
upload in the same way?

Reproduce code:
---
I am using a form that has these fields:




I am deliberately using multiple-depths as I am building an automatic form
handler that will be able to handle any form.

Expected result:

'submission' => array
(
'screenshot' => array
'name' => 'monster_wallpaper.jpg'
'type' => 'image/jpeg'
'tmp_name' => '/tmp/php48lX2Y'
'error' => 0
'size' => 223262
),
'other' => array
(
'dem' => array
(
'0' => array
(
'img' => array
(
'0' => 
'mood_wallpaper.png'
'type' => 'image/png'
'tmp_name' => 
'/tmp/phpLotX1Q'
'error' => 0
'size' => 27809
),

),

),
)

Actual result:
--
array(
'submission' => array
(
'name' => array
(
'screenshot' => 'monster_wallpaper.jpg'
),

'type' => array
(
'screenshot' => 'image/jpeg'
),

'tmp_name' => array
(
'screenshot' => '/tmp/php48lX2Y'
),

'error' => array
(
'screenshot' => 0
),

'size' => array
(
'screenshot' => 223262
),

),

'other' => array
(
'name' => array
(
'dem' => array
(
'0' => array
(
'img' => array
(
'0' => 'mood_wallpaper.png'
),

),

),

),

'type' => array
(
'dem' => array
(
'0' => array
(
'img' => array
(
'0' => 'image/png'
),

),

),

),

'tmp_name' => array
(
'dem' => array
(
'0' => array
(
'img' => array
(
'0' => '/tmp/phpLotX1Q'
),

),

),

),

'error' => array
(
'dem' => array
(
'0' => array
(
'img' => array
(
'0' => 0
),

),

),

),

'size' => array
(
'dem' => array
(
'0' => array
(
'img' => array
(
'0' => 27809
),

),

),

),

),

);

-- 
Edit bug report at http://bugs.php.net/?id=47553&edit=1
-- 
Try a CVS snapshot (PHP 5.2):
http://bugs.php.net/fix.php?id=47553&r=trysnapshot52
Try a CVS snapshot (PHP 5.3):
http://bugs.php.net/fix.php?id=47553&r=trysnapshot53
Try a CVS snapshot (PHP 6.0):   

#47473 [Fbk->Opn]: set_error_handler() crashes the

2009-03-03 Thread typo3 at maltejansen dot de
 ID:   47473
 User updated by:  typo3 at maltejansen dot de
 Reported By:  typo3 at maltejansen dot de
-Status:   Feedback
+Status:   Open
 Bug Type: Reproducible crash
 Operating System: Windows Vista
 PHP Version:  5.3.0beta1
 New Comment:

The max path length is just an example, which is treated differently on
the OS.

I have tried to setup fastcgi in my xampp installation. But I always
get in 500 error. I tried the nearly every thing from google, but every
where there seems to be missing something.

Do you have a complete example of including fastcgi in the apache-conf
for windows?

On Max und Linux is working. So this is realy just a windows bug.


Previous Comments:


[2009-02-25 14:45:05] paj...@php.net

I don't see why the max path lenght limit (which can affect other
systems as well) is related to this backtrace.

Can you try it using a threaded SAPI under linux or using fastcgi on
windows please?



[2009-02-25 10:21:26] typo3 at maltejansen dot de

No, on Linux it's running smoothly (with SAPI I don't know, but it
should), because otherwise Robert or Karsten (Project-Leader) would
already be in contact, what there a with other bugs.
It's just on windows, they using mac/linux.

It seems to be something like the length of a filename on windows with
just 260 characters.

The first time the crash occured, switching from alpha1 to alpha2. In
alpha3 it seems to be solved, because we thought it was connected to
this bug [1] and it was not crashing anymore. In beta1 it was there
again.

[1] http://bugs.php.net/bug.php?id=46241



[2009-02-25 10:06:18] paj...@php.net

Do you mean that you can't reproduce this bug on Linux/Unix (and thread
safe SAPI)?

We still a self contained script to reproduce the problem.



[2009-02-25 10:00:33] typo3 at maltejansen dot de

It's just a problem on Windows Vista (and properbly on Windows XP):

So I have made the backtrace of the apache. The just using the php.exe
does not work right now. (There is somewhere a bug in the CLI-version of
the FLOW3-controller) So this one will follow, tomorrow. But for now:

PHP-Version: Wed Feb 25 09:04:13 2009  

apache__PID__4956__Date__02_25_2009__Time_10_26_11AM__627__Second_Chance_Exception_C005.dmp
Type of Analysis Performed   Crash Analysis 
Machine Name   ~...~
Operating System   Windows Vista Service Pack 1 
Number Of Processors   2 
Process ID   4956 
Process Image   ~\workspaces\flow3\xampplite\apache\bin\apache.exe 
System Up-Time   1 day(s) 01:42:07 
Process Up-Time   00:06:50 

Thread 240 - System ID 5404
Entry point   msvcr71!endthreadex+31 
Create time   25.02.2009 10:19:23 
Time spent in user mode   0 Days 0:0:2.59 
Time spent in kernel mode   0 Days 0:0:8.954 

Function Arg 1 Arg 2 Arg 3   Source 
php5ts!zend_hash_apply+37 08702778 01aa0070 03d68fc0
php5ts!zval_mark_grey+8c 08707b78 03d68fc0 769c9d32
php5ts!gc_mark_roots+95 03d68fc0 769c9d32 0792fa54
php5ts!gc_collect_cycles+64 03d68fc0 03d68fc0 0013
php5ts!zend_deactivate+12d   

PHP5TS!ZEND_HASH_APPLY+37In
apache__PID__4956__Date__02_25_2009__Time_10_26_11AM__627__Second_Chance_Exception_C005.dmp
the assembly instruction at php5ts!zend_hash_apply+37 in
~\workspaces\flow3\xampplite\apache\bin\php5ts.dll from The PHP Group
has caused an access violation exception (0xC005) when trying to
read from memory location 0x000d on thread 240

This is my first time with bug-backtrace. So, tell me, if there is
something else to adjust, except from the manual.

I have include php like this in the apache:
LoadModule php5_module
"~/workspaces/flow3/xampplite/apache/bin/php5apache2_2.dll"



[2009-02-24 10:48:10] j...@php.net

You can always try generating a backtrace of that crash yourself,
instructions are here: http://bugs.php.net/bugs-generating-backtrace
win32.php 

It's propably easier to accomplish with better tools like valgrind on
any *nix system. Unless of course this happens only within win32 env.




The remainder of the comments for this report are too long. To view
the rest of the comments, please view the bug report online at
http://bugs.php.net/47473

-- 
Edit this bug report at http://bugs.php.net/?id=47473&edit=1



#47178 [Opn->Sus]: Missing gzip headers in gzencode() output

2009-03-03 Thread mike
 ID:   47178
 Updated by:   m...@php.net
 Reported By:  wharmby at uk dot ibm dot com
-Status:   Open
+Status:   Suspended
 Bug Type: Zlib Related
 Operating System: Windows XP
 PHP Version:  6CVS-2009-01-21 (snap)
 Assigned To:  mike
 New Comment:

Hi Andy!

Sorry for the standard-bla of the quick fix in my previos response.

Interestingly, gzencode(..., FORCE_DEFLATE) does not make any sense to
me in PHP versions lower than v6.  I cannot remember why or even if I
noticed this legacy behaviour back when I reimplemented zlib code.

For clarification:

RFC1951 = raw deflate
- not much to say here
RFC1950 = zlib encoding, AKA HTTP deflate;
- being [zlib header][deflated data][adler checksum]
RFC1952 = gzip encoding
- being [gzip header][deflated data][crc32 checksum, original size]

The output of PHP5s gzencode(..., FORCE_DEFLATE) is neither of the
previous formats, but rather zlib encoded data additionally prepended
with a gzip header:
[gzip header][zlib header][deflated data][adler checksum]
This is obscure IMHO.

Obviously, this exists and is even documented for ages, so I kindly ask
you to take this issue to internals@ for discussion, so people can
decide what's going to happen.

Thank you.


Previous Comments:


[2009-03-02 11:01:28] whar...@php.net

Hi Mike
  If you think the bug lies in php5 can you re-assign to that release
please. I will fix the PHPT accordingly

Regards
   Andy 



[2009-03-02 10:50:14] wharmby at uk dot ibm dot com

Hi Mike
  Can you expand on your reason for closing this defect as bogus a
little more please given that:

(1) The same test produces different results on php 5.2 and 5.3, 
i.e the output from gzencode() with FORCE_DEFLATE includes the zlib 
headers in both cases. 

(2) The PHP manual says for the gzencode() option 'encoding mode'
"If you use FORCE_DEFLATE, you get a standard zlib deflated 
string (inclusive zlib headers) after the gzip file header 
but without the trailing crc32 checksum. "
This suggests that the output should include zlib headers. 

So if  the PHP 6 behaviour is correct does this not mean there is a 
bug in both PHP 5 code and description of the command in the PHP 
manual ? I raised the bug against PHP 6 as its behaviour differed to 
previous releases and I assumed it was a bug in the new zlib code 
but if the bug lies in PHP % I am happy to fix up the new PHPT's and
open a defect against PHP 5. 

Regards
 Andy 

Andy Wharmby
E-mail: andy_whar...@uk.ibm.com



[2009-02-28 14:01:33] m...@php.net

Thank you for taking the time to write to us, but this is not
a bug. Please double-check the documentation available at
http://www.php.net/manual/ and the instructions on how to report
a bug at http://bugs.php.net/how-to-report.php

Of course raw deflate encoded data does not have a gzip header.



[2009-01-21 11:41:35] wharmby at uk dot ibm dot com

New tests dropped for gzencode dropped to php 5.2, 5.3 and 6.

ext/zlib/tests/gzencode_variation2
ext/zlib/tests/gzencode_variation2-win32

in PHP 6 both tagged with XFAIL sections referencing this defect



[2009-01-21 10:27:36] wharmby at uk dot ibm dot com

Description:

Missing gzip headers in output from gzencode() when FORCE_DEFLATE
option specified.

Problem persists for all values for $level argument.

Problem seen at PHP 6 level only.

I will be dropping some new PHPT shortly; the PHP 6 version will be
tagged with XFAIL section because of this defect.


Reproduce code:
---


Expected result:

Based on output for same script from 5.2/5.3 I expect something like:

unicode(62)
"1f8b0803f348cdc9c95708cf2fca49010056b1174a0b00"
unicode(58)
"1f8b0803789cf348cdc9c95708cf2fca490100180b041d"


Actual result:
--
unicode(62)
"1f8b080bf348cdc9c95708cf2fca49010056b1174a0b00"
unicode(38) "789cf348cdc9c95708cf2fca490100180b041d"





-- 
Edit this bug report at http://bugs.php.net/?id=47178&edit=1



#47551 [Opn]: Export zend_ini_scanner_get_lineno

2009-03-03 Thread dpatterson at dplhenterprises dot com
 ID:   47551
 User updated by:  dpatterson at dplhenterprises dot com
 Reported By:  dpatterson at dplhenterprises dot com
 Status:   Open
 Bug Type: Feature/Change Request
 Operating System: Windows
 PHP Version:  5.3.0beta1
 New Comment:

By the way, since 5.3 hasn't been released yet, it would be great if
this was changed in 5.2 as well.


Previous Comments:


[2009-03-03 16:11:09] dpatterson at dplhenterprises dot com

Description:

It is not currently possible for an extension that calls
zend_ini_scanner_get_lineno() to be built shared under Windows.
This is because the zend_ini_scanner_get_lineno() symbol is not
exported via the ZEND_API macro.

Please modify zend_ini_scanner.h and zend_ini_scanner.c, adding
ZEND_API to the prototype and definition of the
zend_ini_scanner_get_lineno() function.

Thank you.






-- 
Edit this bug report at http://bugs.php.net/?id=47551&edit=1



#47549 [Opn->Csd]: get_defined_constants() return array with broken array categories

2009-03-03 Thread iliaa
 ID:   47549
 Updated by:   il...@php.net
 Reported By:  pahan at hubbitus dot info
-Status:   Open
+Status:   Closed
 Bug Type: Scripting Engine problem
 Operating System: Linux
 PHP Version:  5.3.0beta1
 New Comment:

This bug has been fixed in CVS.

Snapshots of the sources are packaged every three hours; this change
will be in the next snapshot. You can grab the snapshot at
http://snaps.php.net/.
 
Thank you for the report, and for helping us make PHP better.




Previous Comments:


[2009-03-03 07:49:37] pahan at hubbitus dot info

Description:

When $categorize parameter set to true, and expected categorized result

by extension it has crazy mishmash of keys and values.

Expected results got on version 5.2.9

Reproduce code:
---


Expected result:

Array
(
[CONNECTION_ABORTED] => 1
[CONNECTION_NORMAL] => 0
[CONNECTION_TIMEOUT] => 2

[DNS_ANY] => 268435456
[DNS_ALL] => 251713587
)






Actual result:
--
Array
(   
[PREG_PATTERN_ORDER] => 1
[PREG_SET_ORDER] => 2
[PREG_OFFSET_CAPTURE] => 256
[PREG_SPLIT_NO_EMPTY] => 1
[PREG_SPLIT_DELIM_CAPTURE] => 2
[PREG_SPLIT_OFFSET_CAPTURE] => 4
[PREG_GREP_INVERT] => 1
[PREG_NO_ERROR] => 0
[PREG_INTERNAL_ERROR] => 1
[PREG_BACKTRACK_LIMIT_ERROR] => 2
[PREG_RECURSION_LIMIT_ERROR] => 3
[PREG_BAD_UTF8_ERROR] => 4
[PREG_BAD_UTF8_OFFSET_ERROR] => 5
[PCRE_VERSION] => 7.3 2007-08-28
)





-- 
Edit this bug report at http://bugs.php.net/?id=47549&edit=1



#47554 [NEW]: call_user_func_array returns NULL (instead of FALSE) for invalid callbacks

2009-03-03 Thread jimmy at basicmatrix dot com
From: jimmy at basicmatrix dot com
Operating system: Linux
PHP version:  5.2.9
PHP Bug Type: Scripting Engine problem
Bug description:  call_user_func_array returns NULL (instead of FALSE) for 
invalid callbacks

Description:

call_user_func_array() claims it "Returns the function result, or FALSE on
error."

My testing shows it returns NULL if the callback function is not a valid
callback.

Reproduce code:
---


Expected result:

string(5) "Good."
Warning: call_user_func_array() [function.call-user-func-array]: First
argument is expected to be a valid callback, 'not_callable' was given in
___ on line 9
FALSE

Actual result:
--
string(5) "Good."
Warning: call_user_func_array() [function.call-user-func-array]: First
argument is expected to be a valid callback, 'not_callable' was given in
___ on line 9
NULL

-- 
Edit bug report at http://bugs.php.net/?id=47554&edit=1
-- 
Try a CVS snapshot (PHP 5.2):
http://bugs.php.net/fix.php?id=47554&r=trysnapshot52
Try a CVS snapshot (PHP 5.3):
http://bugs.php.net/fix.php?id=47554&r=trysnapshot53
Try a CVS snapshot (PHP 6.0):
http://bugs.php.net/fix.php?id=47554&r=trysnapshot60
Fixed in CVS:
http://bugs.php.net/fix.php?id=47554&r=fixedcvs
Fixed in CVS and need be documented: 
http://bugs.php.net/fix.php?id=47554&r=needdocs
Fixed in release:
http://bugs.php.net/fix.php?id=47554&r=alreadyfixed
Need backtrace:  
http://bugs.php.net/fix.php?id=47554&r=needtrace
Need Reproduce Script:   
http://bugs.php.net/fix.php?id=47554&r=needscript
Try newer version:   
http://bugs.php.net/fix.php?id=47554&r=oldversion
Not developer issue: 
http://bugs.php.net/fix.php?id=47554&r=support
Expected behavior:   
http://bugs.php.net/fix.php?id=47554&r=notwrong
Not enough info: 
http://bugs.php.net/fix.php?id=47554&r=notenoughinfo
Submitted twice: 
http://bugs.php.net/fix.php?id=47554&r=submittedtwice
register_globals:
http://bugs.php.net/fix.php?id=47554&r=globals
PHP 4 support discontinued:  http://bugs.php.net/fix.php?id=47554&r=php4
Daylight Savings:http://bugs.php.net/fix.php?id=47554&r=dst
IIS Stability:   
http://bugs.php.net/fix.php?id=47554&r=isapi
Install GNU Sed: 
http://bugs.php.net/fix.php?id=47554&r=gnused
Floating point limitations:  
http://bugs.php.net/fix.php?id=47554&r=float
No Zend Extensions:  
http://bugs.php.net/fix.php?id=47554&r=nozend
MySQL Configuration Error:   
http://bugs.php.net/fix.php?id=47554&r=mysqlcfg



#39130 [Com]: Compile failure when using VC++ 2005

2009-03-03 Thread jmckenna at gatewaygeomatics dot com
 ID:   39130
 Comment by:   jmckenna at gatewaygeomatics dot com
 Reported By:  ben dot yan at msn dot com
 Status:   No Feedback
 Bug Type: Compile Failure
 Operating System: Windows
 PHP Version:  5.2CVS-2007-07-22
 Assigned To:  pajoye
 New Comment:

I have the exact same problem with PHP 5.2.9 and VS 2008.

-jeff


Previous Comments:


[2008-05-20 01:00:01] php-bugs at lists dot php dot net

No feedback was provided for this bug for over a week, so it is
being suspended automatically. If you are able to provide the
information that was originally requested, please do so and change
the status of the bug back to "Open".



[2008-05-12 09:54:03] paj...@php.net

Please try using this CVS snapshot:

  http://snaps.php.net/php5.2-latest.tar.gz
 
For Windows (zip):
 
  http://snaps.php.net/win32/php5.2-win32-latest.zip

For Windows (installer):

  http://snaps.php.net/win32/php5.2-win32-installer-latest.msi





[2008-02-12 03:54:48] someone at farpost dot com

Fixed this error adding symbol _USE_32BIT_TIME_T to all projects in the
Preprocessor Definitions.



[2008-02-12 02:30:31] someone at farpost dot com

Version 5.2.5 and VS 2005. Still have this problem.



[2007-07-22 15:38:01] j...@php.net

Wez, can you please check this out, it should be simple fix (for
someone who actually has this VC++ thingie)



The remainder of the comments for this report are too long. To view
the rest of the comments, please view the bug report online at
http://bugs.php.net/39130

-- 
Edit this bug report at http://bugs.php.net/?id=39130&edit=1



#39130 [NoF->WFx]: Compile failure when using VC++ 2005

2009-03-03 Thread pajoye
 ID:   39130
 Updated by:   paj...@php.net
 Reported By:  ben dot yan at msn dot com
-Status:   No Feedback
+Status:   Wont fix
 Bug Type: Compile Failure
 Operating System: Windows
 PHP Version:  5.2CVS-2007-07-22
 Assigned To:  pajoye
 New Comment:

We support VC6 only for 5.2.x, it may work with VS2008 (vc9) but there
is no guarantee. PHP 5.3 supports 2008 out of the box.


Previous Comments:


[2009-03-03 23:58:11] jmckenna at gatewaygeomatics dot com

I have the exact same problem with PHP 5.2.9 and VS 2008.

-jeff



[2008-05-20 01:00:01] php-bugs at lists dot php dot net

No feedback was provided for this bug for over a week, so it is
being suspended automatically. If you are able to provide the
information that was originally requested, please do so and change
the status of the bug back to "Open".



[2008-05-12 09:54:03] paj...@php.net

Please try using this CVS snapshot:

  http://snaps.php.net/php5.2-latest.tar.gz
 
For Windows (zip):
 
  http://snaps.php.net/win32/php5.2-win32-latest.zip

For Windows (installer):

  http://snaps.php.net/win32/php5.2-win32-installer-latest.msi





[2008-02-12 03:54:48] someone at farpost dot com

Fixed this error adding symbol _USE_32BIT_TIME_T to all projects in the
Preprocessor Definitions.



[2008-02-12 02:30:31] someone at farpost dot com

Version 5.2.5 and VS 2005. Still have this problem.



The remainder of the comments for this report are too long. To view
the rest of the comments, please view the bug report online at
http://bugs.php.net/39130

-- 
Edit this bug report at http://bugs.php.net/?id=39130&edit=1



#47555 [NEW]: Can not make PDO_OCI.so

2009-03-03 Thread geniushome at qq dot com
From: geniushome at qq dot com
Operating system: AIX6.1
PHP version:  5.2.9
PHP Bug Type: PDO related
Bug description:  Can not make PDO_OCI.so

Description:

Software:AIX6.1+IBM Http Server-1.3(Apache-1.3)+PHP-5.2.6

# pwd
/usr/local/PDO_OCI-1.0

# /usr/local/php/bin/phpize
PHP Api Version: 20041225
Zend Module Api No:  20060613
Zend Extension Api No:   220060519

# ./configure \
  --with-php-config=/usr/local/php/bin/php-config \
  --with-pdo-oci=instantclient,/oracle/product/10.2.0,10.2.0.3>
..
..
..
checking whether to build shared libraries... no
checking whether to build static libraries... yes

creating libtool
appending configuration tag "CXX" to libtool
configure: creating ./config.status
config.status: creating config.h

# make
..
..
creating ./pdo_oci.la
(cd ./.libs && rm -f pdo_oci.la && ln -s ../pdo_oci.la pdo_oci.la)
mv: 0653-401 Cannot rename ./.libs/pdo_oci.so to ./pdo_oci.so:
 A file or directory in the path name does not exist.
make: 1254-004 The error code from the last command is 1.


-- 
Edit bug report at http://bugs.php.net/?id=47555&edit=1
-- 
Try a CVS snapshot (PHP 5.2):
http://bugs.php.net/fix.php?id=47555&r=trysnapshot52
Try a CVS snapshot (PHP 5.3):
http://bugs.php.net/fix.php?id=47555&r=trysnapshot53
Try a CVS snapshot (PHP 6.0):
http://bugs.php.net/fix.php?id=47555&r=trysnapshot60
Fixed in CVS:
http://bugs.php.net/fix.php?id=47555&r=fixedcvs
Fixed in CVS and need be documented: 
http://bugs.php.net/fix.php?id=47555&r=needdocs
Fixed in release:
http://bugs.php.net/fix.php?id=47555&r=alreadyfixed
Need backtrace:  
http://bugs.php.net/fix.php?id=47555&r=needtrace
Need Reproduce Script:   
http://bugs.php.net/fix.php?id=47555&r=needscript
Try newer version:   
http://bugs.php.net/fix.php?id=47555&r=oldversion
Not developer issue: 
http://bugs.php.net/fix.php?id=47555&r=support
Expected behavior:   
http://bugs.php.net/fix.php?id=47555&r=notwrong
Not enough info: 
http://bugs.php.net/fix.php?id=47555&r=notenoughinfo
Submitted twice: 
http://bugs.php.net/fix.php?id=47555&r=submittedtwice
register_globals:
http://bugs.php.net/fix.php?id=47555&r=globals
PHP 4 support discontinued:  http://bugs.php.net/fix.php?id=47555&r=php4
Daylight Savings:http://bugs.php.net/fix.php?id=47555&r=dst
IIS Stability:   
http://bugs.php.net/fix.php?id=47555&r=isapi
Install GNU Sed: 
http://bugs.php.net/fix.php?id=47555&r=gnused
Floating point limitations:  
http://bugs.php.net/fix.php?id=47555&r=float
No Zend Extensions:  
http://bugs.php.net/fix.php?id=47555&r=nozend
MySQL Configuration Error:   
http://bugs.php.net/fix.php?id=47555&r=mysqlcfg



#33500 [Com]: imap_open() fails when the server advertises GSSAPI

2009-03-03 Thread sami dot sipponen at storaenso dot com
 ID:   33500
 Comment by:   sami dot sipponen at storaenso dot com
 Reported By:  ed2019 at columbia dot edu
 Status:   Open
 Bug Type: Feature/Change Request
 Operating System: RHEL4
 PHP Version:  4.3.10
 New Comment:

Please PHP developers, fix this bug since there are no other elegant
methods to connect Exchange 2007 than imap_open. Implement
authentication method attribute to IMAP_OPEN or make it automatically
use multiple methods.


Previous Comments:


[2009-02-06 01:49:31] steve dot englart at gmail dot com

I can't connect to Exchange 2007 sp1
PHP running on Windows 2000
C:\php>php -v
PHP 5.2.8 (cli) (built: Dec  8 2008 19:31:23)

with Pear Net_POP3 1.3.6   stable

example from getMessage() after logon...

  Error in authentication: USER NOT supported authentication
method!. This server supports these methods: GSSAPI, but I support APO
P,PLAIN,LOGIN,USER



[2009-01-07 20:07:47] spryde at aas dot com

Bug still present, 5.2.8, Centos 5.2.



[2008-12-07 03:59:17] phalenor at gmail dot com

imap_open() absolutely needs a way to specify the order of
authentication mechanisms to try. If one is attempting to do
username/password auth to an imap server that supports GSSAPI,
imap_open() tries GSSAPI then stops, never attempting to do PLAIN auth
or otherwise. 

This should not be viewed as a misconfiguration of the imap server, as
clients that use c-client manage to try multiple auth mechs.



[2008-10-10 13:36:24] php at eikel dot org

Hello,

this problem still exists in PHP 5.2.6. As stated by Mark Crispin [1]
this problem is probably a bug in the PHP IMAP implementation. Any
suggestions how to fix this problem?

Regards,
Benjamin

[1]
http://mailman2.u.washington.edu/pipermail/imap-uw/2005-June/000101.html



[2008-06-20 15:04:41] josh_barth at hotmail dot com

If you happen to run across this error while attempting to connect to
an Exchange server...  In my case Exchange 2007 from Ubuntu

Install Kerberos client i.e heimdal-client

Switch to the apache userfor Ubuntu that is "www-data":

su www-data

kinit usern...@domainname.com 'Mind the case lo...@upper

klist 'Will show current ticket granting ticket and other tokens

Note: krbtgt will expire and this procedure will need to be repeated I
am currently researching a method to ensure an active krbtgt at all
times

Try testing with this script as the apache user, replacing ipaddress,
username, domainname and password.

Connection Failure!");

echo "Mailboxes\n";
$folders = imap_listmailbox($mbox, "{ipaddress:993}", "*");

if ($folders == false) {
echo "Call failed\n";
} else {
foreach ($folders as $val) {
echo $val . "\n";
}
}

echo "Headers in INBOX\n";
$headers = imap_headers($mbox);

if ($headers == false) {
echo "Call failed\n";
} else {
foreach ($headers as $val) {
echo $val . "\n";
}
}

imap_close($mbox);
?>



The remainder of the comments for this report are too long. To view
the rest of the comments, please view the bug report online at
http://bugs.php.net/33500

-- 
Edit this bug report at http://bugs.php.net/?id=33500&edit=1