????JFIF??x?x????'
Server IP : 79.136.114.73 / Your IP : 216.73.216.238 Web Server : Apache/2.4.7 (Ubuntu) PHP/5.5.9-1ubuntu4.29 OpenSSL/1.0.1f System : Linux b8009 3.13.0-170-generic #220-Ubuntu SMP Thu May 9 12:40:49 UTC 2019 x86_64 User : www-data ( 33) PHP Version : 5.5.9-1ubuntu4.29 Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority, MySQL : ON | cURL : ON | WGET : ON | Perl : ON | Python : ON | Sudo : ON | Pkexec : ON Directory : /proc/self/root/home/b8009/php-5.6.22/ext/pdo_oci/tests/ |
Upload File : |
--TEST-- PECL PDO_OCI Bug #6364 (segmentation fault on stored procedure call with OUT binds) --SKIPIF-- <?php if (!extension_loaded('pdo') || !extension_loaded('pdo_oci')) die('skip not loaded'); require(dirname(__FILE__).'/../../pdo/tests/pdo_test.inc'); PDOTest::skip(); ?> --FILE-- <?php require dirname(__FILE__) . '/../../pdo/tests/pdo_test.inc'; $dbh = PDOTest::factory(); @$dbh->exec ("drop table bug_6364_t"); $dbh->exec ("create table bug_6364_t (c1 varchar2(10), c2 varchar2(10), c3 varchar2(10), c4 varchar2(10), c5 varchar2(10))"); $dbh->exec ("create or replace procedure bug_6364_sp(p1 IN varchar2, p2 IN varchar2, p3 IN varchar2, p4 OUT varchar2, p5 OUT varchar2) as begin insert into bug_6364_t (c1, c2, c3) values (p1, p2, p3); p4 := 'val4'; p5 := 'val5'; end;"); $stmt = $dbh->prepare("call bug_6364_sp('p1','p2','p3',?,?)"); $out_param1 = "a"; $out_param2 = "a"; $stmt->bindParam(1, $out_param1,PDO::PARAM_STR, 1024); $stmt->bindParam(2, $out_param2,PDO::PARAM_STR, 1024); $stmt->execute() or die ("Execution error: " . var_dump($dbh->errorInfo())); var_dump($out_param1); var_dump($out_param2); foreach ($dbh->query("select * from bug_6364_t") as $row) { var_dump($row); } print "Done\n"; // Cleanup $dbh->exec ("drop procedure bug_6364_sp"); $dbh->exec ("drop table bug_6364_t"); ?> --EXPECTF-- string(4) "val4" string(4) "val5" array(10) { ["c1"]=> string(2) "p1" [0]=> string(2) "p1" ["c2"]=> string(2) "p2" [1]=> string(2) "p2" ["c3"]=> string(2) "p3" [2]=> string(2) "p3" ["c4"]=> NULL [3]=> NULL ["c5"]=> NULL [4]=> NULL } Done