Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:72680 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 65971 invoked from network); 18 Feb 2014 11:10:37 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 18 Feb 2014 11:10:37 -0000 Authentication-Results: pb1.pair.com header.from=yohgaki@gmail.com; sender-id=pass Authentication-Results: pb1.pair.com smtp.mail=yohgaki@gmail.com; spf=pass; sender-id=pass Received-SPF: pass (pb1.pair.com: domain gmail.com designates 209.85.215.43 as permitted sender) X-PHP-List-Original-Sender: yohgaki@gmail.com X-Host-Fingerprint: 209.85.215.43 mail-la0-f43.google.com Received: from [209.85.215.43] ([209.85.215.43:58565] helo=mail-la0-f43.google.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id 55/00-65468-BAF33035 for ; Tue, 18 Feb 2014 06:10:37 -0500 Received: by mail-la0-f43.google.com with SMTP id pv20so11994499lab.2 for ; Tue, 18 Feb 2014 03:10:32 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to:cc:content-type; bh=G0OPZsb0mes/wZ0crec/sHYgIo/W3c5c4R61iadtYhU=; b=RuTzekjNvfAMsn56Ar2e7G3jll40hHcNRN9Uri3Dlrd351W+UTKpkgQZ+hklcV8iKA 1oOm5XesxEwKnqUAXsaP2x4Kg9iySNGy6eLYvyGmss5rLDlHPGhwTuJlx2PGPg6z29kF 61k0zXz2uGlLgENW2VkAvO1dqU1z4QIvhgN/rWsHqZhCXaoV6d51MylGXnjMwDJruihp nbacu2wnTejwblvBaigEcHUV4vRn0zqBZFYS9cDvjEn4rRUQRcI3K48TCEUkN8xgQoou lbSXHOykFahlectp0g10T7AlBS55Lydaur1tgDpML7j2t12eMsdxXjGRyA/auNNaP9+f pLfw== X-Received: by 10.112.158.131 with SMTP id wu3mr20233156lbb.6.1392721832342; Tue, 18 Feb 2014 03:10:32 -0800 (PST) MIME-Version: 1.0 Sender: yohgaki@gmail.com Received: by 10.112.199.37 with HTTP; Tue, 18 Feb 2014 03:09:52 -0800 (PST) In-Reply-To: References: Date: Tue, 18 Feb 2014 20:09:52 +0900 X-Google-Sender-Auth: a-RHTw4J5phFxA-qf-e43vgruog Message-ID: To: Tjerk Meesters Cc: Damien Tournoud , "internals@lists.php.net" Content-Type: multipart/alternative; boundary=001a11c37b32167ad304f2ac526a Subject: Re: [PHP-DEV] [VOTE] Secure Session Module Options/Internal by Default From: yohgaki@ohgaki.net (Yasuo Ohgaki) --001a11c37b32167ad304f2ac526a Content-Type: text/plain; charset=UTF-8 Hi Tjerk, On Tue, Feb 18, 2014 at 7:56 PM, Tjerk Meesters wrote: > It seemed to be part of the patch of the respective rfc: > > > https://gist.github.com/yohgaki/1379668#file-php-trunk-strict-session-patch-L602 > > How was this a merge issue? > Could you point out what's the exact issue here? It's gist and it's not the patch merged. tests/session_id_basic.phpt var_dump(session_id()); var_dump(session_id("test")); var_dump(session_id()); var_dump(session_id("1234567890")); var_dump(session_id()); // Turn off strice mode, since it does not allow uninitialized session ID ini_set('session.use_strict_mode',false); var_dump(session_start()); var_dump(session_id()); var_dump(session_destroy()); var_dump(session_id()); echo "Done"; ob_end_flush(); ?> --EXPECTF-- *** Testing session_id() : basic functionality *** string(0) "" string(0) "" string(4) "test" string(4) "test" string(10) "1234567890" bool(true) string(10) "1234567890" bool(true) string(0) "" Done It works like this. Is there issue with this behavior? Regards, -- Yasuo Ohgaki yohgaki@ohgaki.net --001a11c37b32167ad304f2ac526a--