Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:107777 Return-Path: Delivered-To: mailing list internals@lists.php.net Received: (qmail 95244 invoked from network); 7 Nov 2019 12:11:16 -0000 Received: from unknown (HELO php-smtp3.php.net) (208.43.231.12) by pb1.pair.com with SMTP; 7 Nov 2019 12:11:16 -0000 Received: from php-smtp3.php.net (localhost [127.0.0.1]) by php-smtp3.php.net (Postfix) with ESMTP id 5C29B2CEF8C for ; Thu, 7 Nov 2019 02:01:09 -0800 (PST) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on php-smtp3.php.net X-Spam-Level: X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,FREEMAIL_FROM,HTML_MESSAGE,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE autolearn=no autolearn_force=no version=3.4.2 X-Spam-ASN: AS3215 2.6.0.0/16 X-Spam-Virus: Error (Cannot connect to unix socket '/var/run/clamav/clamd.ctl': connect: Connection refused) Received: from mail-io1-xd2e.google.com (mail-io1-xd2e.google.com [IPv6:2607:f8b0:4864:20::d2e]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by php-smtp3.php.net (Postfix) with ESMTPS for ; Thu, 7 Nov 2019 02:01:08 -0800 (PST) Received: by mail-io1-xd2e.google.com with SMTP id p6so1611612iod.7 for ; Thu, 07 Nov 2019 02:01:08 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to; bh=kY6q3e8u7bZywPT8uqJ8VfMR/Csgx885kfLuj5FWXAw=; b=Un/GFyKJ8W7TidXIhubj4nNgXoJT2pGsMLVwSPfP6+AF+lBckoF+s2UyqpvqtDimHi vRUDdFa68Uv2bd9Alwb8EazD59QeuNT79FRChldktYa+nr750ZA2AdvMLtzkgwzKQmuL 6B6Os6XHewlDafgOb5Xq+YcGl9wxSAbcl4Ltk+y4NLU8oP0UQm/PfJJoAkG5h3ra7VrM 6SfnzOdFCgrr1XGqjlCirmakeyJ2OsDnl4tbCaRr/6CTqh/rxVE/MbrJalnNeV0XQSj5 XKrVDKVzdw5Rel9ZFTFFLba/kWA162y2mYQ37iOQozSJowq+nB3X53bcPB/iD9TqAwQD /yMA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to; bh=kY6q3e8u7bZywPT8uqJ8VfMR/Csgx885kfLuj5FWXAw=; b=kycuAA4jUdtYG+AiPJ923Fmit+0m43ZoqoXtcWGJ6TgU0hXBaM5axXX0ycTYb/mNKT 73Z6AY1rbvsZQcAq4tQZ8eBn+VCyD2MDiaZZ7ZsIwg3BfJb5fSyFdTz5s6YeJOhu6EsL 4mrKwEj9EB/137BRmy1+956Mkvocp8b0zLIP57AQd3kBfmXuZ9nPzzW7fepmuGHBDeQo 8LlYChYY8zM/D7UnGcAAchdTvie9v81hT1SnipQGcKqHuNRBZdmKiR2p+Ze+QkjyC1W6 u1Q1bWPZyeFgM8MzIW7O0RQJ7K88GMFgNoZpzIJ5bHCrS1VsknZNFx3pknDS5L87Psuw MqIA== X-Gm-Message-State: APjAAAVo5QsVeFA0bMaEI+3CsSWXQbtBegRzFNL2xHor7sT02EQimSlp s1pOUU2JGOXtig/+tQ2LwvsSmYpTJYkLqVdolkNl7g== X-Google-Smtp-Source: APXvYqzqLECz5zAfLqsUPvkhty2BQB0RPn5auXr7GsxBtBZy4QAEnLEKTSMvAp47HaA1dP5dt/fuLtBzijSfGfiky9M= X-Received: by 2002:a6b:691b:: with SMTP id e27mr2619358ioc.206.1573120867999; Thu, 07 Nov 2019 02:01:07 -0800 (PST) MIME-Version: 1.0 References: In-Reply-To: Date: Thu, 7 Nov 2019 10:00:56 +0000 Message-ID: To: PHP internals list Content-Type: multipart/alternative; boundary="00000000000086a6920596bebedc" X-Envelope-From: Subject: Re: [PHP-DEV] PHP 7.4 BC break with openssl_random_pseudo_bytes() From: rowan.collins@gmail.com (Rowan Tommins) --00000000000086a6920596bebedc Content-Type: text/plain; charset="UTF-8" On Wed, 6 Nov 2019 at 19:44, Jakub Zelenka wrote: > I have to say that the RFC wasn't really well done as the implementation > followed which caused this omission. We should really look properly to the > implementation when creating RFC so it's more detailed and doesn't cause > omission like this. > There's a bit of a Catch-22 there: voters want to know all the edge-cases before they approve an RFC; but developers want to know the RFC will be approved before they spend hours refining a patch. In some ways, it would be good to have two votes: one on the principle, and one on the detailed implementation; but that could make the process feel quite long and bureaucratic. Regards, -- Rowan Tommins [IMSoP] --00000000000086a6920596bebedc--