On Tue, 20 Jul 2004, Andi Gutmans wrote:
> A few people have mentioned to me that they were bitten by the PHP auth
> bug. Do you guys think it warrants a release?
> I think it might do.
I don't think it does unless there is a whole lot of more bugs
fixed, especailly crashes in the "Zend engine 2"
Jeremy Johnstone wrote:
I was gonna hack a quick image generation script together, but the URL you
gave seems to work fine already. The links directly to the relevant code are:
And if you follow the link at the end of the page, you should read some
reasons why Turing protection is not a good thin
On Tuesday 20 July 2004 04:46 pm, Jacques Marneweck wrote:
> Hi Daniel,
>
> Take a look over @ Colin Viebrock's Blog and see how his turing test
> works (http://www.viebrock.ca/code/11/email-protection) and I posted
> to you earlier how to do sound turing links.
>
I was gonna hack a quick image g
Andi,
Yahoo in the sent mail shows the attachment, but it didn't show up in
the list. I've posted it at:
http://aduni.org/~msisolak/php5isapi.c.patch
This is for the PHP_5_0 branch. I believe that for HEAD the change
would just be to use STR_EMPTY_ALLOC() at the end of
sapi_isapi_read_cookes()
Hey,
A few people have mentioned to me that they were bitten by the PHP auth
bug. Do you guys think it warrants a release?
I think it might do.
Andi
--
PHP Internals - PHP Runtime Development Mailing List
To unsubscribe, visit: http://www.php.net/unsub.php
Hello Cristiano,
First, I'd like to say that a function of this type sounds useful.
It's one that I've wanted for some time, particularly for verifying
that an array has the correct keys when it is passed as a function
parameter.
If I understand what you are doing correctly, the same
Michael,
If you didn't forget, then maybe you can post a URL to the patch?
Thanks,
Andi
At 12:34 AM 7/21/2004 +0200, Stefan Esser wrote:
Andi Gutmans wrote:
You forgot to attach the patch...
Not necessary. I believe that certain webmail accounts have problems
sending attachments to the list. I gue
Andi Gutmans wrote:
You forgot to attach the patch...
Not necessary. I believe that certain webmail accounts have problems
sending attachments to the list. I guess that is caused by whatever
attaches the PHP-Internals tag to the end of every listmail.
Stefan
--
PHP Internals - PHP Runtime Develo
You forgot to attach the patch...
At 02:55 PM 7/20/2004 -0700, Michael Sisolak wrote:
I believe that a bug was introduced with version 1.3 of php5isapi.c.
The sapi_isapi_read_cookies() function used to return NULL when there
were no cookies, but was changed to return "" instead. That's fine,
but t
I believe that a bug was introduced with version 1.3 of php5isapi.c.
The sapi_isapi_read_cookies() function used to return NULL when there
were no cookies, but was changed to return "" instead. That's fine,
but then HttpExtensionProc() attempts to free the non-ealloc'ed empty
string and dies with
Hi Daniel,
Take a look over @ Colin Viebrock's Blog and see how his turing test
works (http://www.viebrock.ca/code/11/email-protection) and I posted
to you earlier how to do sound turing links.
Hope this enspires you.
Regards
--jm
On Tue, 20 Jul 2004 16:28:06 -0400, Daniel Convissor
<[EMAIL PRO
Oh I see. So maybe you should just call it safe_malloc() or it'll be too
confusing :)
At 06:28 AM 7/21/2004 +0900, Moriyoshi Koizumi wrote:
On 2004/07/21, at 6:11, Andi Gutmans wrote:
Looks good but why not rename the function to _safe_pemalloc()? (And of
course rename to safe_pemalloc() as you
On 2004/07/21, at 6:11, Andi Gutmans wrote:
Looks good but why not rename the function to _safe_pemalloc()? (And
of course rename to safe_pemalloc() as you do later on.
Because it's there just for persistent allocation, while pemalloc() can
be used both ways.
Moriyoshi
--
PHP Internals - PHP Ru
Looks good but why not rename the function to _safe_pemalloc()? (And of
course rename to safe_pemalloc() as you do later on.
At 05:26 AM 7/21/2004 +0900, Moriyoshi Koizumi wrote:
Here's the patch. I'm going to commit this soon.
Moriyoshi
Index: Zend/zend_alloc.c
==
On Tue, Jul 20, 2004 at 10:17:59PM +0200, Derick Rethans wrote:
>
> You're wrong, for each comment there were four requests done with
> curl...
Crap. Thanks for the heads up. Back to the drawing board...
--Dan
--
T H E A N A L Y S I S A N D S O L U T I O N S C O M P A N Y
Here's the patch. I'm going to commit this soon.
Moriyoshi
Index: Zend/zend_alloc.c
===
RCS file: /repository/ZendEngine2/zend_alloc.c,v
retrieving revision 1.138
diff -u -r1.138 zend_alloc.c
--- Zend/zend_alloc.c 15 Jul 2004 22:59:5
Hi:
When posting to internals, you may have received an email like the
following:
[EMAIL PROTECTED] is currently protecting themselves from
receiving junk mail using Spamcease Just this once, click the link
below so I can receive your emails. You won't have to do this again.
Don't go
On Tue, 20 Jul 2004, Daniel Convissor wrote:
> Hi Wez:
>
> On Tue, Jul 20, 2004 at 08:17:04PM +0100, Wez Furlong wrote:
> > I know this is just a quick measure, but isn't the whole idea to not
> > emit the code in plain text on the form? It's really very easy to
> > scrape it out.
>
> Yes, it is
On Tue, Jul 20, 2004 at 03:38:26PM -0400, Daniel Convissor wrote:
>
> Hmm... guess it would be a good idea to delete the CAPTCHA value from the
> session data after the form is submitted to avoid multiple submissions
> using the same value.
Done. Here are the complete diffs...
http://cvs.php.
Hi Wez:
On Tue, Jul 20, 2004 at 08:17:04PM +0100, Wez Furlong wrote:
> I know this is just a quick measure, but isn't the whole idea to not
> emit the code in plain text on the form? It's really very easy to
> scrape it out.
Yes, it is simple to scrape. But, I suspect that the problem is coming
Hello Kamesh,
Monday, July 19, 2004, 11:19:30 AM, you wrote:
> Hi,
> Now handle member of zend_module_entry is getting populated(see php_dl
> function inside the ext/standard/dl.c).
> But it will not help as it should be set before calling
> zend_register_module_ex.(As this function copies the wh
Hi all,
I needed to intersect an array with database records indexed by the primary
key, with an array with keys and there is no php function that will do it
internally.
The database array looks like:
$records = array ( 2587 => array('Name', 'Address', 'zip'), ...);
And the array with PKS:
$pks
I know this is just a quick measure, but isn't the whole idea to not
emit the code in plain text on the form? It's really very easy to
scrape it out.
--Wez.
On Tue, 20 Jul 2004 14:32:44 -0400, Daniel Convissor
<[EMAIL PROTECTED]> wrote:
> It's pretty crude. All it does is set a session var wit
On Tue, Jul 20, 2004 at 07:47:41PM +0200, Derick Rethans wrote:
> On Tue, 20 Jul 2004, Daniel Convissor wrote:
> > I'm in the middle of making a quick and dirty CAPTCHA routine for the bug
> > form on pear.php.net. I'll post the diff when it's ready.
>
> We'll also need something like that for cv
On Tue, 20 Jul 2004, Daniel Convissor wrote:
> On Tue, Jul 20, 2004 at 12:53:08PM -0400, Jason Garber wrote:
> >
> > Perhaps we should implement one of the "read this obscure image and
> > type the number into this text box" scheme into all the bug post and
> > update forms?
>
> I'm in the m
On Tue, 20 Jul 2004, Dan Kalowsky wrote:
> Thanks for shutting this down Derick et al. Now the follow-up
> question, is it possible to remove all these entries from the list
> archives?
I've no idea how to do that, it's up to some qmail/ezmlm wiz I think.
Derick
--
PHP Internals - PHP Runtime
Thanks for shutting this down Derick et al. Now the follow-up
question, is it possible to remove all these entries from the list
archives?
--
PHP Internals - PHP Runtime Development Mailing List
To unsubscribe, visit: http://www.php.net/unsub.php
On Tue, Jul 20, 2004 at 12:53:08PM -0400, Jason Garber wrote:
>
> Perhaps we should implement one of the "read this obscure image and
> type the number into this text box" scheme into all the bug post and
> update forms?
I'm in the middle of making a quick and dirty CAPTCHA routine for the
On Tue, 20 Jul 2004, Monte Ohrt wrote:
> In case you weren't aware, the smary.php.net (and presumably other
> sites) are not responding atm.
I know, I had to shut down apache due to a spam attack; it's back up
again.
regard,
Derick
--
PHP Internals - PHP Runtime Development Mailing List
To uns
Please ignore...
Just a test...
--
PHP Internals - PHP Runtime Development Mailing List
To unsubscribe, visit: http://www.php.net/unsub.php
On Tue, 20 Jul 2004, Derick Rethans wrote:
> On Tue, 20 Jul 2004, Adam Maccabee Trachtenberg wrote:
>
> > Can someone please post when it's safe to start checking my
> > bugs.php.net folder again? Asshole spammers.
>
> I blocked the IP, removed all the spam comments and sent an abuse to
> ev1.net
Hello,
Perhaps we should implement one of the "read this obscure image and
type the number into this text box" scheme into all the bug post and
update forms?
--
Best regards,
Jasonmailto:[EMAIL PROTECTED]
Tuesday, July 20, 2004, 11:57:25 AM, you wrote:
US> Th
On Tue, Jul 20, 2004 at 11:45:35AM -0400, Adam Maccabee Trachtenberg wrote:
> Can someone please post when it's safe to start checking my
> bugs.php.net folder again? Asshole spammers.
philip made a quick fix...
http://cvs.php.net/diff.php/php-bugs-web/bug.php?r1=1.64&r2=1.65&ty=u
--Dan
--
T H
On Tue, 20 Jul 2004, Adam Maccabee Trachtenberg wrote:
> Can someone please post when it's safe to start checking my
> bugs.php.net folder again? Asshole spammers.
I blocked the IP, removed all the spam comments and sent an abuse to
ev1.net (the IP belonged to them). Until I hear from them apache
At 16:26 20/07/2004, Moriyoshi Koizumi wrote:
On 2004/07/20, at 14:10, Sara Golemon wrote:
Is there any reason there's no safe_pemalloc()?
I once had exactly the same thought. Probably because there'd be no need
for persistence, and stream folks now obviously need it :)
Yep, no special reason - let
There is some spammer on the bugs page who updates all bugs and adds a new
comment to every bug with a URL to a porn page. What can we do? My mailbox
gets fuller and fuller...
-
Uwe Schindler
[EMAIL PROTECTED] - http://www.php.net
NSAPI SAPI developer
Erlangen, Germany
--
PHP Internals - PHP
Hello Curt,
From http://us2.php.net/manual/en/language.operators.assignment.php
"The value of an assignment expression is the value assigned.
That is, the value of "$a = 3" is 3."
I take this to mean that ($foo->a = 'bar') will always return 'bar'
and that is a core feature of the languag
Can someone please post when it's safe to start checking my
bugs.php.net folder again? Asshole spammers.
-adam
--
[EMAIL PROTECTED]
author of o'reilly's "upgrading to php 5" and "php cookbook"
avoid the holiday rush, buy your copies today!
--
PHP Internals - PHP Runtime Development Mailing Lis
On 2004/07/20, at 14:10, Sara Golemon wrote:
Is there any reason there's no safe_pemalloc()?
I once had exactly the same thought. Probably because there'd be no need
for persistence, and stream folks now obviously need it :)
Moriyoshi
--
PHP Internals - PHP Runtime Development Mailing List
To unsub
Hi All,
Can someone explain/point me about block_interruptions and
unblock_interruptions member of struct _sapi_module_struct.
With regards
Kamesh Jayachandran
--
PHP Internals - PHP Runtime Development Mailing List
To unsubscribe, visit: http://www.php.net/unsub.php
From: Steph
> well.. would it kill anyone to have iconv built-in anyway? I mean by
> default built-in? At present that's done purely for libxml but Frank's
> right, gtk+ also has it as a dependency. Are these the only two areas
that
> rely on iconv at all?
As far as I could tell yes those are
I'm testing, too...
"Derick Rethans" <[EMAIL PROTECTED]> ha scritto nel messaggio
news:[EMAIL PROTECTED]
> ignore
--
PHP Internals - PHP Runtime Development Mailing List
To unsubscribe, visit: http://www.php.net/unsub.php
Hello,
1)Only code that tries to create/initialize a Non-Persistent hash table
is vulnerable under certain cases.
True or False.
False, anything that is not correctly initialised at the time the
memory_limit request termination kicks in can potentially be exploited.
This includes string pointers.
On Tue, 20 Jul 2004 08:15:09 +0100, Steph <[EMAIL PROTECTED]> wrote:
> Wez could answer me a
> question here: if iconv was built-in, would it now (or will it soon be)
> possible to ensure that it was built prior to libxml or any other extension
> that might rely on it?
Yep, my patch is in HEAD. (5
Hi All,
I have PHP-4.2.3.
As per http://security.e-matters.de/advisories/112004.html , my PHP is
vulnerable.
I have a overview of the problem.
Can someone answer my questions which make my understanding of the
problem even better?
1)Only code that tries to create/initialize a Non-Persistent hash ta
well.. would it kill anyone to have iconv built-in anyway? I mean by
default built-in? At present that's done purely for libxml but Frank's
right, gtk+ also has it as a dependency. Are these the only two areas that
rely on iconv at all?
We had a discussion about integrating iconv before now (il
46 matches
Mail list logo