Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:37799 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 671 invoked from network); 22 May 2008 11:35:43 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 22 May 2008 11:35:43 -0000 Authentication-Results: pb1.pair.com smtp.mail=steph@zend.com; spf=softfail; sender-id=softfail Authentication-Results: pb1.pair.com header.from=steph@zend.com; sender-id=softfail Received-SPF: softfail (pb1.pair.com: domain zend.com does not designate 64.97.136.190 as permitted sender) X-PHP-List-Original-Sender: steph@zend.com X-Host-Fingerprint: 64.97.136.190 smtpout0190.sc1.he.tucows.com Solaris 8 (1) Received: from [64.97.136.190] ([64.97.136.190:41916] helo=n066.sc1.he.tucows.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id D5/10-34040-E8A55384 for ; Thu, 22 May 2008 07:35:43 -0400 Received: from sc1-out03.emaildefenseservice.com (64.97.139.2) by n066.sc1.he.tucows.com (7.2.069.1) id 4769F91801175DD7; Thu, 22 May 2008 11:35:37 +0000 X-SpamScore: 2 X-Spamcatcher-Summary: 2,0,0,d931c79f1a908dc9,2659b82809ca53c9,steph@zend.com,-,RULES_HIT:152:355:379:539:540:541:542:543:567:599:601:945:968:973:988:989:1155:1156:1260:1277:1311:1313:1314:1345:1437:1515:1516:1518:1534:1541:1587:1593:1594:1676:1711:1730:1747:1766:1792:2073:2075:2078:2379:2393:2559:2562:2693:3027:3352:3622:3865:3866:3867:3869:3870:3871:3872:3873:3874:4250:4362:5007:6119:6261:7875:7903:7974:8660,0,RBL:none,CacheIP:none,Bayesian:0.5,0.5,0.5,Netcheck:none,DomainCache: 0,MSF:not bulk,SPF:,MSBL:none,DNSBL:none,TSO:0 X-Spamcatcher-Explanation: Received: from foxbox (host86-137-246-48.range86-137.btcentralplus.com [86.137.246.48]) (Authenticated sender: steph.fox) by sc1-out03.emaildefenseservice.com (Postfix) with ESMTP; Thu, 22 May 2008 11:35:36 +0000 (UTC) Message-ID: <009c01c8bc00$1ed8dd90$4401a8c0@foxbox> Reply-To: "Steph Fox" To: "Stan Vassilev | FM" , References: <012701c8bb44$68f8b880$4401a8c0@foxbox> <48342DB7.2020108@isdg.net> <353f2c6f0805211141m9719d58xe0a128adbc14b656@mail.gmail.com> <353f2c6f0805211146p43d6aa96u9e6e03e82490b1c@mail.gmail.com> <325D72617BCF43A39670646B85FDB5FD@pc> Date: Thu, 22 May 2008 12:36:46 +0100 Organization: Zend Technologies MIME-Version: 1.0 Content-Type: text/plain; format=flowed; charset="UTF-8"; reply-type=response Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2900.2180 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2180 Subject: Re: [PHP-DEV] RFC: allow_call_pass_by_reference From: steph@zend.com ("Steph Fox") Hi Stan, > There is a use case for the function allowing *explicitly* call-time pass > by reference, because the function works both ways in subtly different > ways. This RFC isn't about whether or not this behaviour should be deprecated. It simply recommends that a warning be thrown by default in PHP 5.3 so that people will know to fix their code. The rationale for this is that there is ALWAYS a warning thrown in PHP 6, with no possibility to avoid that warning. It is also still marked deprecated in PHP 6, i.e. there is presumably a firm intention to remove the possibility for call-time pass-by-ref altogether. call_time_pass_by_reference behaviour has been deprecated for 8 years plus - since before the PHP 4.0 release. If you're writing code that relies on that behaviour, either you don't care about the warning or you've never seen it. I suspect rather a lot of PHP users have never seen it, because by default that warning isn't thrown at all. If you want to argue that there should be no warning by default, fine. But please try to stay on-topic. Thanks, - Steph