Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:77688 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 500 invoked from network); 28 Sep 2014 02:24:40 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 28 Sep 2014 02:24:40 -0000 Authentication-Results: pb1.pair.com smtp.mail=ajf@ajf.me; spf=pass; sender-id=pass Authentication-Results: pb1.pair.com header.from=ajf@ajf.me; sender-id=pass Received-SPF: pass (pb1.pair.com: domain ajf.me designates 192.64.116.216 as permitted sender) X-PHP-List-Original-Sender: ajf@ajf.me X-Host-Fingerprint: 192.64.116.216 imap10-3.ox.privateemail.com Received: from [192.64.116.216] ([192.64.116.216:41513] helo=imap10-3.ox.privateemail.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id 11/00-00393-66177245 for ; Sat, 27 Sep 2014 22:24:39 -0400 Received: from localhost (localhost [127.0.0.1]) by mail.privateemail.com (Postfix) with ESMTP id 108B124005D; Sat, 27 Sep 2014 22:24:36 -0400 (EDT) X-Virus-Scanned: Debian amavisd-new at imap10.ox.privateemail.com Received: from mail.privateemail.com ([127.0.0.1]) by localhost (imap10.ox.privateemail.com [127.0.0.1]) (amavisd-new, port 10024) with LMTP id 3DPfHUyECObd; Sat, 27 Sep 2014 22:24:35 -0400 (EDT) Received: from oa-res-27-90.wireless.abdn.ac.uk (oa-res-27-90.wireless.abdn.ac.uk [137.50.27.90]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.privateemail.com (Postfix) with ESMTPSA id 8E6BE2400C2; Sat, 27 Sep 2014 22:24:34 -0400 (EDT) Content-Type: text/plain; charset=windows-1252 Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\)) In-Reply-To: Date: Sun, 28 Sep 2014 03:24:31 +0100 Cc: Rowan Collins , "internals@lists.php.net" Content-Transfer-Encoding: quoted-printable Message-ID: References: <07153B91-E12F-4B16-ADD7-86CFC75C4642@ajf.me> <54220EB4.60001@sugarcrm.com> <6A21F4EF-476E-476C-A64B-246B8929172B@ajf.me> <5422DD87.80109@gmail.com> <568C0F03-B23B-43FC-963D-6D0D23405E9D@ajf.me> <54230209.2050406@sugarcrm.com> <54233C70.3060604@gmail.com> <54236D16.3070401@sugarcrm.com> <54242A0C.3000309@gmail.com> To: Dmitry Stogov X-Mailer: Apple Mail (2.1878.6) Subject: Re: [PHP-DEV] [RFC] ZPP Failure On Overflow From: ajf@ajf.me (Andrea Faulds) On 26 Sep 2014, at 07:57, Dmitry Stogov wrote: > May be this overflow checks should be optional? > In old ages compilers for Wirth family languages had option to enable = or > disable overflow checks. > If option is enabled we may throw an exception, if no - work as today. > Any user would be able to chose between compatibility and safety. I really, really don=92t like this idea. PHP needs less INI-dependant = behaviour, not more. -- Andrea Faulds http://ajf.me/