Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:92775 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 50196 invoked from network); 26 Apr 2016 09:49:17 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 26 Apr 2016 09:49:17 -0000 Authentication-Results: pb1.pair.com smtp.mail=cmbecker69@gmx.de; spf=pass; sender-id=pass Authentication-Results: pb1.pair.com header.from=cmbecker69@gmx.de; sender-id=pass Received-SPF: pass (pb1.pair.com: domain gmx.de designates 212.227.15.19 as permitted sender) X-PHP-List-Original-Sender: cmbecker69@gmx.de X-Host-Fingerprint: 212.227.15.19 mout.gmx.net Received: from [212.227.15.19] ([212.227.15.19:57410] helo=mout.gmx.net) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id 76/7D-02401-B993F175 for ; Tue, 26 Apr 2016 05:49:16 -0400 Received: from [192.168.2.102] ([84.187.31.83]) by mail.gmx.com (mrgmx002) with ESMTPSA (Nemesis) id 0LztD9-1bpWHk3YlX-0155qR; Tue, 26 Apr 2016 11:49:11 +0200 To: Sara Golemon , PHP internals References: Message-ID: <571F39A5.6080505@gmx.de> Date: Tue, 26 Apr 2016 11:49:25 +0200 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.7.2 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-Provags-ID: V03:K0://3PC4H0EcsFOAmwOF7SzuLh9aGYji9/nfhdjBOjq8sxk4B3Ve0 xTDkiteJ/g41IOS47bpPS53THwQ0d39Cap+Si1EgdoIFEFC/fYw2f1lQYCu15759ZSI3I4y /xrhAH+S3mC8Ll/uecpFPM2KDUTpvLhZB1lGmles2ZETcTkgAd4c8YC5BN9W7r7ndDyAvD4 vWus9+Xn1ApVCAuNReluQ== X-UI-Out-Filterresults: notjunk:1;V01:K0:SF64VxnGuuI=:shQxUQ2Y2OcKi8ni3nAHIJ G/CgLA3rCh7P/Zoi+DZth+1P3NHEMtkv2KKXbpe6x3v09+vcs3WVF2EUatuMycp/Qye9ytfjf /2ab7Qsm2Ns0BBz4MhwKbj4y2wVWDxR1kJqGv/NQ1GRi7qqTY4sbIype2j75BwkDR8dTuI3W9 qdQzxDYvahKUuHkZ34f2KjW+L6Cqa2+HylGV3FR5yP7y2aCdlumH4DCrldS4O0r5hkMuhJ8KK BhJBunYu4+qDMcfJJTSJ9RPBRAYKL6Nm3iAX9ijUOkj138mIevEBNY12zdTHtA/uhxje6i+O+ IabzfiKkfN27W23dLd10dO2x220DDtHmUvu6HsezPp31QgQXhY0sVkoxOvlDAwoTHgnCtL3WX OmVvkeVoNYKXGqFuFBJxWZkavSBpkSzjg+4Tz9BHRnbxpD6WDLiXgPcV9ZybzWBW6wqmH4YhL HWMqGLE1JDS21RW3u9K/VHn/0sxw66ueegENtHNZh+LioCypdW5XK1PgDU/hPg+5nW+RvWcdv m9P7sXVJKe21tVt1ocZJZzQTAY45Sa+Kzn+vVpJjTifxrX14UBi0XxCS9Eq760xyt5ELHONzG OIcqAyptM1+njcDkEfPd+uB7ntT0RWDPgi6I4k7eT/cVxtVd1CxfgN52ZYmYquS2B4S+Qv2f1 cLTWVUKcpiETrPo4h0XRq8VtqEH79o4lIMp5VvPRcLwEZw5+yNU5TTnALPNVWUHVXwqehV8WK +bE/UnW4lqlSPSBkm6SsFKXrNZ+z9YWSI62BV20loWUOMaxwjdF48MIEjKw/lhLlVoCAPIMRU cnixCt8 Subject: Re: [RFC] [Discussion] Octal overflow detection From: cmbecker69@gmx.de (Christoph Becker) On 19.04.2016 at 01:24, Sara Golemon wrote: > On Tue, Apr 12, 2016 at 7:38 PM, Sara Golemon wrote: >> https://wiki.php.net/rfc/octal.overload-checking >> Because having this expression evaluate to true makes me sad: ("\000" >> === "\400") >> > I haven't heard any responses on this and wanted to bump it back to > the top of your newsreaders. > > For the record, my inclination is to raise a warning on octal > overflow, but not change behavior (at least, not for 7.1, perhaps > later). ACK. For now I have documented the issue (). -- Christoph M. Becker