Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:109241 Return-Path: Delivered-To: mailing list internals@lists.php.net Received: (qmail 83420 invoked from network); 23 Mar 2020 19:34:01 -0000 Received: from unknown (HELO php-smtp4.php.net) (45.112.84.5) by pb1.pair.com with SMTP; 23 Mar 2020 19:34:01 -0000 Received: from php-smtp4.php.net (localhost [127.0.0.1]) by php-smtp4.php.net (Postfix) with ESMTP id 8A4C31804FD for ; Mon, 23 Mar 2020 10:58:14 -0700 (PDT) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on php-smtp4.php.net X-Spam-Level: X-Spam-Status: No, score=-0.7 required=5.0 tests=BAYES_20,DKIM_SIGNED, DKIM_VALID,FREEMAIL_FROM,RCVD_IN_DNSWL_LOW,SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.2 X-Spam-ASN: AS8560 212.227.0.0/16 X-Spam-Virus: No X-Envelope-From: Received: from mout.gmx.net (mout.gmx.net [212.227.17.20]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by php-smtp4.php.net (Postfix) with ESMTPS for ; Mon, 23 Mar 2020 10:58:13 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.net; s=badeba3b8450; t=1584986292; bh=U3k+fA84KTCfQuJX5oOlGa7ZEYDQwUrZn07P3m/d0Tk=; h=X-UI-Sender-Class:From:To:Subject:Date; b=KOQVVyjb7yM8zmK4ieTvLvdU6BVj8MBg3E+NC6qek2mHVfri4ij+a3OihFKBs9E88 qP2EVwBUUd0zO3BNapOJHA+PaIMmOEqHGw0m7pO6NrPgPzbx4/pFNjFpbFfDnkHJmh MC2DXQz23GhtwHMKdAZAjkX/bIv2gBNzZQE/hNqs= X-UI-Sender-Class: 01bb95c1-4bf8-414a-932a-4f6e2808ef9c Received: from DESKTOPF2PTDOD ([87.122.202.22]) by mail.gmx.com (mrgmx105 [212.227.17.168]) with ESMTPSA (Nemesis) id 1N6bjy-1jK1sY0K6w-0186Yf for ; Mon, 23 Mar 2020 18:58:12 +0100 To: "'PHP internals'" Date: Mon, 23 Mar 2020 18:58:06 +0100 Message-ID: <003701d6013c$9afe9750$d0fbc5f0$@gmx.de> MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable X-Mailer: Microsoft Outlook 16.0 Content-Language: de Thread-Index: AdYBO4Sq4eZIPvbFS9KoEXRKUNf9QQ== X-Provags-ID: V03:K1:2ergPhDfyGQPa4/Tvomf38zmJuKGZpGvaYaumXUpsZlly2mEDu8 vtQ6MqcLaJGycit91li24feNsJRa13ee7SSREUN0Je7SIZ3KKpQ2U/WhkTvvfmesImORbuo M7qWNyvz4hN3GOaV6P8d+M/xgZP41g59ZFooA72o9PuHZAr1LtWPwP7ysvX3Yl22pUCJHAN yLTYpsvjAyvz0aNyB5tSg== X-UI-Out-Filterresults: notjunk:1;V03:K0:4X1GHPadwnw=:SBjtrAWQeDJeKZuwXAmnV5 BaldHSm8XyuP2jf2rcyjyTN5hFLACvuWfKKX3zhHaMmPxe/PtYHsydTFRzIxREYE9tD0NTSp4 xN0tBZTJrmAaFOQzv596gXdKk/jEaf/nocYWvoA/hApLNY+JJH7tsp6HRFXppOsO2xa63+xzo c8oo+mb0i/5Ea86zDS3wBY3Pvm5dBSeJKd6gQVuc4UbeehKYf+GDJKkzckOcaouwZ7fJpmWwR uRIJKdZYFM65AnNvDZViVcBUWT3xhRDfdvC/vdvFURbgXChCneRsUF5UvLhkx8kYsaBeNLWbQ Rr3fd1UUZok7A7oGtgADCoNClBXdsYt2r3fZ/+3TDjWcY6cBBPR10JHtRr9cbhjrlvdoJJNbg vhntjUrmpLbKE+riG4+hXDema9+URQUwq+MZzrQ4I78w55+y89vmzyuzTeA9DUvImoWUHXcRF 4czZC9cuS+kq70/E5X9K6uXmD3V8+2Qgp7M6bPSugNofWnpEnCTGXku6VYmySQtuXi4Ci5RKZ bqVQuedGE8fAfw0DsRlDEYXJ+6JfWATJswO4C8EJGgT8nszE2Eh1laZJUxHjU9jy4Ubxg+p43 3a/Kb5T7YB4dGh9PF+fhPWxH9D7VV0nlUDevHQ2ZTT/y++4Z7CSJGYwFcxmEhmWy4KAVgF7Yj nlMQw98COOsvGuOXfyA8APBNcXFPJsJaJjAO3m2GQr8Wl2ypvt3Hs1e8tZmzFYSSGavTSa633 0lzihS4qYspJpwsIvC5/C3D3V1e1b59n4GwfpxuqJM28E7nFLeRKFX8mY441Yn7wxK9ZYS4VB H3D/7F1DN6Cbps3lkD8g4/Y7hHU8sJM4U46qiHKoRZ4PdwK5pDujoG/F33530kWYvz8KgygvO RvpEemJiC+ep35O+txbXwtyXfhDASpV9QVV2F1Y78m4HB7GqaDZrEnH78uliNwzBQajRGRv7M Z/5VOyPm1ikh2Uey7NUQAnna6S8MmC8X7Cz3Mkw50OJ9nK5ULHLFUqj2ytysmFPolyhCdkMqg KlggqH8uc2Q1z9zt2shtT1TaO+K/aXyziPcziMaijFdXUk3bJfyUnUDCG4v3OCtg/ZbiNJDVt LqM8AlBSRaXY2V452MXC/SjcuNXMF7eA2DlVhOSsBNiehIz/PHg1s1NBS6xV2HxxlCUJ/ubv/ b7brjO7NGbdIt04L5l+r3XEb7L5EX0v3b0mRSif8KxvY1WfeEOyS31OwkZrZpqKpwT5vcDlIw 1alu1iYAWY7mRNA9t Subject: [VOTE] Userspace operator overloading From: jan.h.boehmer@gmx.de Hi internals, I have opened voting on https://wiki.php.net/rfc/userspace_operator_overloading, which allows = users to overload operators in their own classes. Voting closes on 2020-04-06. Regards, Jan B=F6hmer