Am 24.09.2019 um 06:18 schrieb Pierre Joye <pierre....@gmail.com>:
> On Mon, Sep 23, 2019 at 10:17 PM Larry Garfield <la...@garfieldtech.com> 
> wrote:
> 
>> I cannot speak for OpenSSL,  but random_bytes() and random_int() were 
>> changed very late in the 7.0 cycle to throw exceptions so that they "fail 
>> closed".  Otherwise if you expect a random value back but get a constant 
>> value (false or empty string), if you don't remember to check it yourself 
>> every time then you now have a security hole because you're using a constant 
>> seed for random-dependent behavior.
>> 
>> That was a good change, and it should be kept that way, IMO.
> 
> Fully agree. This is actually pretty the only way to handle errors
> with these functions. Anything else creates a risk that we could have
> easily prevented.


The main point of my original mail was stripped so I changed the subject to 
emphasise what I really care about.

So here is my question: Am I the only one who thinks BC breaks should be fully 
covered in an RFC before voting?

Regards,
- Chris

--
PHP Internals - PHP Runtime Development Mailing List
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to