Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:103416 Return-Path: Delivered-To: mailing list internals@lists.php.net Received: (qmail 26225 invoked from network); 3 Nov 2018 13:20:45 -0000 Received: from unknown (HELO mo4-p00-ob.smtp.rzone.de) (85.215.255.23) by pb1.pair.com with SMTP; 3 Nov 2018 13:20:45 -0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; t=1541237900; s=strato-dkim-0002; d=kelunik.com; h=Cc:To:Subject:Message-ID:Date:From:In-Reply-To:References: X-RZG-CLASS-ID:X-RZG-AUTH:From:Subject:Sender; bh=48gwsjJUhQRe5kX1ToHTyqCLeFFiZudqXhRGlEkw43I=; b=MTEflSdKlUReF2I8PmBMlqEaw5hdnRj2WyydhvzGnSAxQCvDyDe9yZwnlnIbpbt5Im l+MkmdM66VYmqbPAwerAmxaL/d9T9AvzcBQ5FwG4OkT8HhdWoD2mBoDyD41Cj4NKBgKF SwsL3Amy9No38fzH8+xCxjt1etbuhSBOH9AGwmnI7vi4v02Pe1fEPPR1V7FxB1Z2z0SK 3n4F9giSPWBCh1MakCF+tPCLgRZfp0yN7Rnu4OTMrZ83SKVbgk5HmBpHbawaQM0/QFj7 r2Pb50/fTectAwGbQCA22oqcygJ8CXvFd7ZI2Jpvgv/jjxIstBYdnHfLewHrv4K3yNXy KyRg== X-RZG-AUTH: ":IWkkfkWkbvHsXQGmRYmUo9mlsGbEv0XHBzMIJSS+jKTzde5mDb8Db2nUQi/a" X-RZG-CLASS-ID: mo00 Received: from mail-yw1-f53.google.com by smtp.strato.de (RZmta 44.3 AUTH) with ESMTPSA id Y09eaauA39cKGL0 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (curve secp384r1 with 384 ECDH bits, eq. 7680 bits RSA)) (Client did not present a certificate) for ; Sat, 3 Nov 2018 10:38:20 +0100 (CET) Received: by mail-yw1-f53.google.com with SMTP id j202-v6so1744835ywa.13 for ; Sat, 03 Nov 2018 02:38:20 -0700 (PDT) X-Gm-Message-State: AGRZ1gJcnxvcO0+WXvKahuiopx9cTfaph1tH2wiKOQgWlurNW7q1CUm7 3v1Ds+QtMOEx3LTA7FtWmjs9ZmMFDoA8A9H73NE= X-Google-Smtp-Source: AJdET5d0fVHUHnjYSrECdiUzlauNCijo/ga1hO+clRHDHmQ+ogxdlrYGPv4GhA5lJ2gJSUUy836VPUcJZRZZEopCJ2U= X-Received: by 2002:a0d:d8c3:: with SMTP id a186-v6mr14475220ywe.15.1541237900142; Sat, 03 Nov 2018 02:38:20 -0700 (PDT) MIME-Version: 1.0 References: In-Reply-To: Date: Sat, 3 Nov 2018 10:38:09 +0100 X-Gmail-Original-Message-ID: Message-ID: To: me@sammyk.me Cc: PHP Internals Content-Type: text/plain; charset="UTF-8" Subject: Re: [PHP-DEV] [RFC] [VOTE] Improve openssl_random_pseudo_bytes() From: me@kelunik.com (Niklas Keller) Hey Sammy, could you please turn your patch into a PR, so it's easier to comment? Thanks, Niklas Am Fr., 2. Nov. 2018 um 20:30 Uhr schrieb Sammy Kaye Powers : > > Hey internals! > > Given there has been at least two weeks of discussion around the RFC, > "Improve openssl_random_pseudo_bytes()" and there doesn't seem to be > any outstanding issues, I have moved the RFC into voting phase. > > The voting period lasts two weeks; from now until 2018-11-16. > > The RFC can be found here: > https://wiki.php.net/rfc/improve-openssl-random-pseudo-bytes > > Happy voting! :) > > Thanks, > Sammy Kaye Powers > sammyk.me > > -- > PHP Internals - PHP Runtime Development Mailing List > To unsubscribe, visit: http://www.php.net/unsub.php >