Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:40228 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 71402 invoked from network); 3 Sep 2008 03:49:06 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 3 Sep 2008 03:49:06 -0000 Authentication-Results: pb1.pair.com smtp.mail=david.coallier@gmail.com; spf=pass; sender-id=pass Authentication-Results: pb1.pair.com header.from=david.coallier@gmail.com; sender-id=pass; domainkeys=bad Received-SPF: pass (pb1.pair.com: domain gmail.com designates 209.85.200.175 as permitted sender) DomainKey-Status: bad X-DomainKeys: Ecelerity dk_validate implementing draft-delany-domainkeys-base-01 X-PHP-List-Original-Sender: david.coallier@gmail.com X-Host-Fingerprint: 209.85.200.175 wf-out-1314.google.com Received: from [209.85.200.175] ([209.85.200.175:57937] helo=wf-out-1314.google.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id 72/65-33714-1390EB84 for ; Tue, 02 Sep 2008 23:49:06 -0400 Received: by wf-out-1314.google.com with SMTP id 26so2663738wfd.26 for ; Tue, 02 Sep 2008 20:49:02 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from:sender :to:subject:cc:in-reply-to:mime-version:content-type :content-transfer-encoding:content-disposition:references :x-google-sender-auth; bh=zK40pMgMvosrVeQG+vow8rDfbz3F96NnFZdsFmYkG6c=; b=uEj6IHtFhLQalF6G9fcHLml6bvN8t+hDoYW05XFabbpeY8ioq7YlWOa2RezcwXq8ol e3fyHC0vGYNYLX+7igaS165H0iAxdK7P+C/TVqU4zjmRi1dZxoRcE9JAoKL4iraa35Il 1D6DeSNpURQc/o+xobHdgQrsPq9ZryMLX9vL4= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:sender:to:subject:cc:in-reply-to:mime-version :content-type:content-transfer-encoding:content-disposition :references:x-google-sender-auth; b=t5o14/YOb4q/OBK7WskwdW6ruCFA9Jdy3C6XdMHZP5Mq/3dJls66XublEPb/ajqXJt IPmmSmp+sFFgzAFxTfDyji8mNWw7iXevwY368ZqNfHlaAN/rSbnq6Vc7z0ZNf7wFTZX4 kYRFz/XBK0+Xdnvez3lwDkvbj4M7q7KhQgKqY= Received: by 10.142.245.10 with SMTP id s10mr2836836wfh.203.1220413742881; Tue, 02 Sep 2008 20:49:02 -0700 (PDT) Received: by 10.142.80.10 with HTTP; Tue, 2 Sep 2008 20:49:02 -0700 (PDT) Message-ID: Date: Tue, 2 Sep 2008 23:49:02 -0400 Sender: david.coallier@gmail.com To: "Scott MacVicar" Cc: "PHP Developers Mailing List" In-Reply-To: <175FE3A6-DF48-42A2-B206-9D2C42D9EAC5@macvicar.net> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit Content-Disposition: inline References: <175FE3A6-DF48-42A2-B206-9D2C42D9EAC5@macvicar.net> X-Google-Sender-Auth: f11ddddd642c0368 Subject: Re: [PHP-DEV] OpenSSL random pseudo bytes From: davidc@php.net ("David Coallier") > > This function has been in OpenSSL for 8 years and supported by every version > since 0.9.5. It's literally just exposing the API, it's safe for inclusion > in 5.3 in my opinion. > I didn't express myself very clearly. What I meant is that we should probably add that switch for the return right now instead of later (IE: "I am however considering making this parameter controlled.") I think it's safe to include it but I'll await on the RMs before saying anything :) Exposing OpenSSL's API is a good idea imo. -- Slan, David