|
php.net | support | documentation | report a bug | advanced search | search howto | statistics | random bug | login |
[2019-10-18 15:27 UTC] security at paragonie dot com
Description: ------------ Found upstream: https://github.com/paragonie/sodium_compat/issues/99 Apparently, when someone installs paragonie/certainty on a specific Windows setup (according to the user, they are using "Win10 Enterprise 1809 and PHP 7.2.15 x64 NTS"), with sodium_compat 1.11.1, they were getting notices. This _may_ be related to https://bugs.php.net/bug.php?id=77621 (not guaranteed), but I'm having a frustrating time trying to reproduce this behavior (and failing every time). In the offchance that there is a Windows bug here (I assumed a race condition with the autoloader, but that doesn't seem to be the cause), I wanted to make sure it's reported upstream. Test script: --------------- Add this to composer.json on the described environment: "require": { "paragonie/certainty": "^2", "paragonie/sodium_compat": "1.11.1" } Then run `composer install`. Then run this: <?php use ParagonIE\Certainty\RemoteFetch; $fetcher = new RemoteFetch('/path/to/certainty/data'); $latestCACertBundle = $fetcher->getLatestBundle(); $ch = curl_init('https://secure.php.net'); curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 2); curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, true); curl_setopt($ch, CURLOPT_CAINFO, $latestCACertBundle->getFilePath()); If you get a bunch of E_WARNING errors, congratulations! You've reproduced it. Expected result: ---------------- No output. Actual result: -------------- Lots of warnings that look like PHP Warning: constant(): Couldn't find constant ParagonIE_Sodium_Compat::CONSTANT_NAME in C:\htdocs\www\testing\vendor\paragonie\sodium_compat\lib\php72compat.php on line 91 PatchesPull RequestsHistoryAllCommentsChangesGit/SVN commits
|
|||||||||||||||||||||||||||||||||
Copyright © 2001-2025 The PHP GroupAll rights reserved. |
Last updated: Wed Oct 29 22:00:02 2025 UTC |
> and here we are now instead doing your homework by just try the latest version and if that donät fix the problem and you correctly report for 5.2.23 from the begin 4 upstream actions could have been saved or probably the problem is gone away at all in the meantime You aren't doing my homework. I literally reported this out of due diligence. You don't have to do anything with this information. If you still consider this a "waste" of YOUR time, stop participating in this thread and let someone with more {patience, capacity to understand human communication and context} handle this instead. I'm sorry you don't see the value in communicating information. It's not even assigned to you anyway.