Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:118328 Return-Path: Delivered-To: mailing list internals@lists.php.net Received: (qmail 92915 invoked from network); 31 Jul 2022 13:51:37 -0000 Received: from unknown (HELO php-smtp4.php.net) (45.112.84.5) by pb1.pair.com with SMTP; 31 Jul 2022 13:51:37 -0000 Received: from php-smtp4.php.net (localhost [127.0.0.1]) by php-smtp4.php.net (Postfix) with ESMTP id 5452E1804BC for ; Sun, 31 Jul 2022 08:50:55 -0700 (PDT) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on php-smtp4.php.net X-Spam-Level: X-Spam-Status: No, score=-0.2 required=5.0 tests=BAYES_40,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.2 X-Spam-ASN: AS398810 136.175.108.0/24 X-Spam-Virus: No X-Envelope-From: Received: from mail-108-mta73.mxroute.com (mail-108-mta73.mxroute.com [136.175.108.73]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by php-smtp4.php.net (Postfix) with ESMTPS for ; Sun, 31 Jul 2022 08:50:54 -0700 (PDT) Received: from filter006.mxroute.com ([140.82.40.27] filter006.mxroute.com) (Authenticated sender: mN4UYu2MZsgR) by mail-108-mta73.mxroute.com (ZoneMTA) with ESMTPSA id 18254f3f6950000261.001 for (version=TLSv1/SSLv3 cipher=ECDHE-RSA-AES128-GCM-SHA256); Sun, 31 Jul 2022 15:50:50 +0000 X-Zone-Loop: dc4fe096ae83f02506d7cf77b07b31d76570c252d004 X-Originating-IP: [140.82.40.27] DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=sandfox.me; s=x; h=MIME-Version:Content-Transfer-Encoding:Content-Type:Date:To:From: Subject:Message-ID:Sender:Reply-To:Cc:Content-ID:Content-Description: Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID: In-Reply-To:References:List-Id:List-Help:List-Unsubscribe:List-Subscribe: List-Post:List-Owner:List-Archive; bh=xZ4YazxYKQfk5qzPA/gOI2OY512I8WNFjOb8yY+MQrc=; b=RISKtFMAK5RLen1eKOU4LXJRqV 7cd4w+aJUlb8HfbTCHOJOmBhTLsCs14mPAhyLSh0d9i9wexERRpEdoOPBz4hi90uYxTpUv43IKdvO 22/vG5FEQaZnmGZuqgB8QlwiuYQapqKP36C8BBBgFNjweFhKU+2oxJP72z5RShSYPcQpHenn+Gx6V S4B7msKc/8GHVp12CTAmq0acTIGSeevervT6aAjsE4OGnq4bNTk/jkVPLdmtBUW2Dcyem4oykB/5K WBVypKNspf19GSagkgaaslugr/eek0vL2q665xU0Vv59bBLbqtdRwUdqO26TYvZzUI54lVce+xnFv ZTfIL1DA==; Message-ID: <524dff3654286a804043c7c49dffe9c526d2114b.camel@sandfox.me> To: PHP Internals List Date: Sun, 31 Jul 2022 18:50:46 +0300 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable User-Agent: Evolution 3.44.3 (3.44.3-1.fc36) MIME-Version: 1.0 X-AuthUser: sandfox@sandfox.me Subject: Negative values in PcgOneseq128XslRr64::jump($advance) From: sandfox@sandfox.me (Anton Smirnov) Hi! I'm writing a polyfill for ext-random and I noticed a small weirdness. PcgOneseq128XslRr64::jump() accepts negative $advance where it automagically becomes unsigned positive. Does it make sense or maybe it's better to throw a ValueError there? --=20 Anton