Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:87093 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 90862 invoked from network); 9 Jul 2015 23:59:37 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 9 Jul 2015 23:59:37 -0000 Authentication-Results: pb1.pair.com smtp.mail=scott@paragonie.com; spf=permerror; sender-id=unknown Authentication-Results: pb1.pair.com header.from=scott@paragonie.com; sender-id=unknown Received-SPF: error (pb1.pair.com: domain paragonie.com from 209.85.220.170 cause and error) X-PHP-List-Original-Sender: scott@paragonie.com X-Host-Fingerprint: 209.85.220.170 mail-qk0-f170.google.com Received: from [209.85.220.170] ([209.85.220.170:34113] helo=mail-qk0-f170.google.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id DD/B5-22102-7EA0F955 for ; Thu, 09 Jul 2015 19:59:37 -0400 Received: by qkcl188 with SMTP id l188so13663322qkc.1 for ; Thu, 09 Jul 2015 16:59:33 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:date:message-id:subject:from:to :content-type; bh=5BF4wUv/vhdr+tguFIhg7HsjHfmvATRzXY5ST8Cbhwg=; b=VUkxL5TFHc+QF4bTFpevmsx+BxWVaThOlnJy8+jOePMSz8FPHUFuNsoLux7gGLLx1I 1wATlT5FFNpXuGmQEduqAOiIIKO4RmOzZmJD8j9AAONflhASPB83z1H8iGT4NhPml0yZ 6XXJCorMxvVVE38JgJI76rQ9D6j43Fk8XGx50FDsWUhMeXU7uWmvwDZGFnJlMx9qXKv2 QIJVijLSKdMrA3n4O8Ue/IUh3GVCA9muMxg4y+/t/+ch9QO5AMrKuhcSrAmxAeSZEhhs /dKeZoBQUmuIP18lWFEjNRqyfK5ADF6d5atFeSHUVxzWxQzfOaVAxZnNuZ9dYu+tQSAF xVnQ== X-Gm-Message-State: ALoCoQlrvcLRXdNYHiilANShzIp0u/+1V5Ji3y40ZG+e7JTDskcoCdQlADm0YW3QPv/NT/ItdbDH MIME-Version: 1.0 X-Received: by 10.140.238.15 with SMTP id j15mr30780848qhc.4.1436486372916; Thu, 09 Jul 2015 16:59:32 -0700 (PDT) Received: by 10.96.83.102 with HTTP; Thu, 9 Jul 2015 16:59:32 -0700 (PDT) X-Originating-IP: [71.47.14.165] Date: Thu, 9 Jul 2015 19:59:32 -0400 Message-ID: To: PHP Internals Content-Type: text/plain; charset=UTF-8 Subject: Backports for random_bytes() and random_int() in PHP 5.x From: scott@paragonie.com (Scott Arciszewski) Hi internals team, Work on a backport for random_bytes() and random_int() is nearly finished. If php-src pull requests 1397 and 1398 are merged, then our polyfill is 100% compatible even in failure conditions. However, before I tag a v1.0.0 release, I'd greatly appreciate it if more people would take a look at the code or test the implementation so I can say, with sufficient confidence, that the library is secure, reliable, and true to the PHP 7 implementation. https://github.com/php/php-src/pull/1397 https://github.com/php/php-src/pull/1398 It's also on Packagist under paragonie/random_compat if that helps anyone acquire it (and, once v1.0.0 is released, include it in your projects easier). Please share this with any crypto / security folks that might be interested in reviewing it. https://github.com/paragonie/random_compat/issues/11 Thanks, Scott Arciszewski Chief Development Officer Paragon Initiative Enterprises