Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:79618 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 8535 invoked from network); 12 Dec 2014 23:14:17 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 12 Dec 2014 23:14:17 -0000 Authentication-Results: pb1.pair.com header.from=ajf@ajf.me; sender-id=pass Authentication-Results: pb1.pair.com smtp.mail=ajf@ajf.me; spf=pass; sender-id=pass Received-SPF: pass (pb1.pair.com: domain ajf.me designates 198.187.29.245 as permitted sender) X-PHP-List-Original-Sender: ajf@ajf.me X-Host-Fingerprint: 198.187.29.245 imap11-3.ox.privateemail.com Received: from [198.187.29.245] ([198.187.29.245:45447] helo=imap11-3.ox.privateemail.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id B7/B0-04052-7C67B845 for ; Fri, 12 Dec 2014 18:14:16 -0500 Received: from localhost (localhost [127.0.0.1]) by mail.privateemail.com (Postfix) with ESMTP id 39F4E8800E7 for ; Fri, 12 Dec 2014 18:14:13 -0500 (EST) X-Virus-Scanned: Debian amavisd-new at imap11.ox.privateemail.com Received: from mail.privateemail.com ([127.0.0.1]) by localhost (imap11.ox.privateemail.com [127.0.0.1]) (amavisd-new, port 10024) with LMTP id piVf-rAkVk3N for ; Fri, 12 Dec 2014 18:14:13 -0500 (EST) Received: from oa-res-26-240.wireless.abdn.ac.uk (oa-res-26-240.wireless.abdn.ac.uk [137.50.26.240]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.privateemail.com (Postfix) with ESMTPSA id DDE348800E5 for ; Fri, 12 Dec 2014 18:14:12 -0500 (EST) Content-Type: text/plain; charset=utf-8 Mime-Version: 1.0 (Mac OS X Mail 8.1 \(1993\)) In-Reply-To: <24634FCA-EB3E-4805-A6D6-A1587A56C141@ajf.me> Date: Fri, 12 Dec 2014 23:14:10 +0000 Content-Transfer-Encoding: quoted-printable Message-ID: References: <24634FCA-EB3E-4805-A6D6-A1587A56C141@ajf.me> To: internals X-Mailer: Apple Mail (2.1993) Subject: Re: [VOTE][RFC] ZPP Failure on Overflow From: ajf@ajf.me (Andrea Faulds) > On 2 Dec 2014, at 21:44, Andrea Faulds wrote: >=20 > Good evening once again, >=20 > I=E2=80=99m putting the ZPP Failure on Overflow RFC to a vote. This = RFC is an important prerequisite to the Big Integer Support RFC, as it = ensures safety in implicit integer parameter conversions. >=20 > The RFC requires a 2/3 majority, and voting starts today (2014-12-02) = and ends in 10 days=E2=80=99 time next Friday (2014-12-12). >=20 > Please read the RFC carefully. If you have any doubts or queries about = the RFC, please don=E2=80=99t hesitate to ask me. >=20 > The RFC and voting widget can be found here: = https://wiki.php.net/rfc/zpp_fail_on_overflow >=20 > Thanks! Good evening, Voting on this RFC has ended. By sixteen votes to none against, the RFC = is accepted. I shall hopefully merge the patch into master sometime = soon. This has been the second prerequisite RFC for the Big Integer Support = RFC, with the first having been the Integer Support RFC. There may still = be one more of these in order to deal with array key overflow handling, = but I am yet to write such an RFC or an implementation. Thanks to everyone for participating in the vote and discussion! -- Andrea Faulds http://ajf.me/=