Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:50327 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 13743 invoked from network); 18 Nov 2010 09:59:29 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 18 Nov 2010 09:59:29 -0000 Authentication-Results: pb1.pair.com smtp.mail=johannes@schlueters.de; spf=permerror; sender-id=unknown Authentication-Results: pb1.pair.com header.from=johannes@schlueters.de; sender-id=unknown Received-SPF: error (pb1.pair.com: domain schlueters.de from 217.114.211.66 cause and error) X-PHP-List-Original-Sender: johannes@schlueters.de X-Host-Fingerprint: 217.114.211.66 ns.km36107.keymachine.de Solaris 10 (beta) Received: from [217.114.211.66] ([217.114.211.66:51648] helo=config.schlueters.de) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id CC/12-32235-009F4EC4 for ; Thu, 18 Nov 2010 04:59:28 -0500 Received: from [192.168.1.31] (ppp-93-104-35-134.dynamic.mnet-online.de [93.104.35.134]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by config.schlueters.de (Postfix) with ESMTPSA id 796C844C63; Thu, 18 Nov 2010 10:59:25 +0100 (CET) To: Rasmus Lerdorf Cc: Andi Gutmans , internals In-Reply-To: <1289899754.3447.3.camel@guybrush> References: <4CE03E41.9030805@lerdorf.com> <8757232E56758B42B2EE4F9D2CA019C9086B69@US-EX2.zend.net> <4CE10E8E.3070901@lerdorf.com> <1289899754.3447.3.camel@guybrush> Content-Type: text/plain; charset="UTF-8" Date: Thu, 18 Nov 2010 10:59:24 +0100 Message-ID: <1290074364.16819.85.camel@guybrush> Mime-Version: 1.0 X-Mailer: Evolution 2.30.2 Content-Transfer-Encoding: 8bit Subject: Re: [PHP-DEV] Adding path_len to all stream functions in trunk From: johannes@schlueters.de (Johannes =?ISO-8859-1?Q?Schl=FCter?=) On Tue, 2010-11-16 at 10:29 +0100, Johannes Schlüter wrote: > On Mon, 2010-11-15 at 02:42 -0800, Rasmus Lerdorf wrote: > > Ok, I went through all the 5.3 code. This should fix the null poisoning > > problems in 5.3 without breaking binary compatibility: > > > > http://progphp.com/nullpatch.txt > > I didn't check it as I'm on vacation traveling right now, but: Does the > data: wrapper allow \0 in the data? Something like > fopen("data:text/plain,foo\0bar" "r"); Answering to myself: php -r 'var_dump(file_get_contents("data:text/plain,foo\0bar"));' string(3) "foo" The data: wrapper looses the stuff already. So I see no harm by the patch. It might even produce an error in this situation which is a good thing (while everybody should use base64 with data: anyways ...) johannes