Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:40226 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 56099 invoked from network); 3 Sep 2008 02:33:32 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 3 Sep 2008 02:33:32 -0000 Authentication-Results: pb1.pair.com smtp.mail=david.coallier@gmail.com; spf=pass; sender-id=pass Authentication-Results: pb1.pair.com header.from=david.coallier@gmail.com; sender-id=pass; domainkeys=bad Received-SPF: pass (pb1.pair.com: domain gmail.com designates 209.85.200.172 as permitted sender) DomainKey-Status: bad X-DomainKeys: Ecelerity dk_validate implementing draft-delany-domainkeys-base-01 X-PHP-List-Original-Sender: david.coallier@gmail.com X-Host-Fingerprint: 209.85.200.172 wf-out-1314.google.com Received: from [209.85.200.172] ([209.85.200.172:44881] helo=wf-out-1314.google.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id AF/72-33714-A77FDB84 for ; Tue, 02 Sep 2008 22:33:31 -0400 Received: by wf-out-1314.google.com with SMTP id 26so2639980wfd.26 for ; Tue, 02 Sep 2008 19:33:27 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from:sender :to:subject:cc:in-reply-to:mime-version:content-type :content-transfer-encoding:content-disposition:references :x-google-sender-auth; bh=g4EynLNidFGMsbYrNvrMyM/h7tgH/GyNRNGTGRFYG3Q=; b=e9kLLE4hkrRE2Ig+IhOuwYBxaE586cGShDjZyh6G7asxxlXIS1+gkSDlbnsOo5/b0D lHunZRgmLfnNemztI3MBOlG0JJAKLKzCg3WT0XXs55N134HQzdrw1KcgWqcZboc/eegs C2XHzD03q5uBZEIkdplmvSzrCOq4KiVNPoND0= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:sender:to:subject:cc:in-reply-to:mime-version :content-type:content-transfer-encoding:content-disposition :references:x-google-sender-auth; b=lCZjY/pQNW6fwZxs5oaHXc2T7TojOH2iN5MrkYDDJeVfl7hU2BQT4xwkz2zWQKzU/0 Go3nwCkWab5/E3W3FI4Cql6uVK15vhfHKYXeX61RpuB7U3IvSrKvNNzOIGgzYQjLX84W DvczZxRMgdOeMbRKMy4rTOS+7/FWiLddGXIhk= Received: by 10.143.33.12 with SMTP id l12mr2810605wfj.272.1220409207907; Tue, 02 Sep 2008 19:33:27 -0700 (PDT) Received: by 10.142.80.10 with HTTP; Tue, 2 Sep 2008 19:33:27 -0700 (PDT) Message-ID: Date: Tue, 2 Sep 2008 22:33:27 -0400 Sender: david.coallier@gmail.com To: "Scott MacVicar" Cc: "PHP Developers Mailing List" In-Reply-To: MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit Content-Disposition: inline References: X-Google-Sender-Auth: a6092c8709a8fc47 Subject: Re: [PHP-DEV] OpenSSL random pseudo bytes From: davidc@php.net ("David Coallier") 2008/9/2 Scott MacVicar : > Hi All, > > Attached and uploaded [1] is a patch to add the OpenSSL random pseudo byte > function, at the moment it will return FALSE if the bytes aren't considered > cryptographically strong, I am however considering making this parameter > controlled. > > Any objections to me applying this to 5.3? I'd say that 5.3 should be a rather "stable" version and that if we add features we should make sure they are rock solid now. Perhaps adding the control (Parameter to control the security/cryptography level) now would save time and would make it a thing less to look back in the future. What do you think? -- Slan, David