Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:72790 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 62291 invoked from network); 24 Feb 2014 10:00:51 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 24 Feb 2014 10:00:51 -0000 Authentication-Results: pb1.pair.com header.from=yohgaki@gmail.com; sender-id=pass Authentication-Results: pb1.pair.com smtp.mail=yohgaki@gmail.com; spf=pass; sender-id=pass Received-SPF: pass (pb1.pair.com: domain gmail.com designates 209.85.215.45 as permitted sender) X-PHP-List-Original-Sender: yohgaki@gmail.com X-Host-Fingerprint: 209.85.215.45 mail-la0-f45.google.com Received: from [209.85.215.45] ([209.85.215.45:60458] helo=mail-la0-f45.google.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id FA/33-46513-2581B035 for ; Mon, 24 Feb 2014 05:00:50 -0500 Received: by mail-la0-f45.google.com with SMTP id b8so5351013lan.4 for ; Mon, 24 Feb 2014 02:00:47 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to:cc:content-type; bh=MGK1yScY0r4UNkPKGbgb3xdxfKz4+It3cKRGXYshIVw=; b=YT662UOKBBwPAE9eTseA39/7W6i3PkLGsOnSmvD8u4CKLmGYqQVUBbROaOyqAkgSK+ TWN09nwDNgZkKpPmk1kwXo0JIxrPh830ZJ5rttlSwyna08LJ7clq4kMVhqHhnoJ4/oGg IwB8wTkC7hoD4yqdPK64mA3Uq5QsgP7NE4TsPKF0ccdf7KgjZaxSZ9A6Rootw+J7hs3W ER85Er12HBrREtZwq8SJoRMn/IhIfVuyfA5CMURNImjldYzmL8m35V1UvazHvxJVVpO/ S2sBXPHZYOlo5qDicZWQIAlYtUpczJjoDC2iVvxQdTKur6i52MK9Kr5X/T7IDKtt6/LJ DzoQ== X-Received: by 10.112.172.98 with SMTP id bb2mr5517146lbc.69.1393236047227; Mon, 24 Feb 2014 02:00:47 -0800 (PST) MIME-Version: 1.0 Sender: yohgaki@gmail.com Received: by 10.112.199.37 with HTTP; Mon, 24 Feb 2014 02:00:07 -0800 (PST) In-Reply-To: References: <5302ABF6.60407@sugarcrm.com> Date: Mon, 24 Feb 2014 19:00:07 +0900 X-Google-Sender-Auth: Mxggz0k_VHFzHVy8p1FRQ4roVZE Message-ID: To: Andrey Andreev Cc: "internals@lists.php.net" Content-Type: multipart/alternative; boundary=001a11c3462eaef11204f3240ba3 Subject: Re: [PHP-DEV] [VOTE] Secure Session Module Options/Internal by Default From: yohgaki@ohgaki.net (Yasuo Ohgaki) --001a11c3462eaef11204f3240ba3 Content-Type: text/plain; charset=UTF-8 Hi Andrey, On Mon, Feb 24, 2014 at 6:50 PM, Andrey Andreev wrote: > > > - hash_bits_per_character will be removed from the RFC. > > - Possible issue with ID length change will be documented. > > - "id_length" will be removed. User should use hash index search. > > - Raise error when hash function is not available. > > I'd be happy with that, yes. :) > Although for hash_bits_per_character, I only insisted the RFC to > explain that this is a change complementing hash_function. > OK. I'll document it. > > > Raising error seems not good... > > If hash extension is available always, it might be easier for other > module, > > too. > > Do not allow DL/disabling hash extension, perhaps? > > > I see no reason why anybody would want to disable the Hash extension, > so sure - I'd remove that choice. > I agree. It will be added to the RFC. > However, silent fallback for stuff like this is never a good thing and > somebody might i.e. make a typo while configuring, so why not raise > E_WARNING for invalid hash_function regardless? Make sense to me, too. I'll make it raise error for any invalid hashes. Thank you for your help :) Regards, -- Yasuo Ohgaki yohgaki@ohgaki.net --001a11c3462eaef11204f3240ba3--