Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:109320 Return-Path: Delivered-To: mailing list internals@lists.php.net Received: (qmail 74628 invoked from network); 26 Mar 2020 04:25:12 -0000 Received: from unknown (HELO php-smtp4.php.net) (45.112.84.5) by pb1.pair.com with SMTP; 26 Mar 2020 04:25:12 -0000 Received: from php-smtp4.php.net (localhost [127.0.0.1]) by php-smtp4.php.net (Postfix) with ESMTP id 376A61804C5 for ; Wed, 25 Mar 2020 19:50:00 -0700 (PDT) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on php-smtp4.php.net X-Spam-Level: X-Spam-Status: No, score=-1.4 required=5.0 tests=BAYES_00, FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM,HEADER_FROM_DIFFERENT_DOMAINS, RCVD_IN_DNSWL_NONE,RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.2 X-Spam-ASN: AS15169 209.85.128.0/17 X-Spam-Virus: No X-Envelope-From: Received: from mail-lf1-f43.google.com (mail-lf1-f43.google.com [209.85.167.43]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by php-smtp4.php.net (Postfix) with ESMTPS for ; Wed, 25 Mar 2020 19:49:59 -0700 (PDT) Received: by mail-lf1-f43.google.com with SMTP id e7so3566324lfq.1 for ; Wed, 25 Mar 2020 19:49:59 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=8vBkKvvsOEff/K4rV4BDfh01acZxPDpxG7welenximc=; b=IGoHI/OH2t5c5IjS8mSdxEb830QlMl2lBqsynMk7aQ/14CKveHrF6brO7NIrgthWQM cK61r4uiqjXO0JsFB3kUqGgmixLK/SWXFx3xB8cAyy4o5g5EgQ4k+X+J0U6SxETotHYO KVVLQC6VATg2SYjF0Fsn4doshoCMq7XUfNGkFClyxq0DxzetulZeIajLx9858/JeLrJ7 E7ZWOoGKiFqn2WQ2g5JX/cC5H5xKovpjfmhUfJEMo722xmtcKR4YVtHS8ujAO4gNi7Bf 8LyDJ1UN081if0jmwMV0yM4OxT2kdOANJdaiaYyUvdkXkx2XKOLJVQgX7wC/5nIrpT1t gKwQ== X-Gm-Message-State: ANhLgQ1uZRHee8wsxl4hvl9FumIGfEOSJIB2gPibxGVQ0gRlZBepacBt S7xZOKugWqbSPHgIuBLQnApGsgN7Js7vvdBR7oc= X-Google-Smtp-Source: ADFU+vt4AqPFPAzZdS8bc9QVJTmyXgYsgAGYzV0RIk3TZdJlztMfrfo4hEe/b80ad/3t9A8ogCZnvKfJeZjD1Ncf+Fo= X-Received: by 2002:ac2:5f75:: with SMTP id c21mr4039567lfc.194.1585190995123; Wed, 25 Mar 2020 19:49:55 -0700 (PDT) MIME-Version: 1.0 References: <003701d6013c$9afe9750$d0fbc5f0$@gmx.de> <379095fd-ba11-4d84-6cab-89905eeab32a@gmx.de> In-Reply-To: <379095fd-ba11-4d84-6cab-89905eeab32a@gmx.de> Date: Wed, 25 Mar 2020 21:49:44 -0500 Message-ID: To: "Christoph M. Becker" Cc: jan.h.boehmer@gmx.de, PHP internals Content-Type: text/plain; charset="UTF-8" Subject: Re: [PHP-DEV] Re: [VOTE] Userspace operator overloading From: jakob@givoni.dk (Jakob Givoni) On Wed, Mar 25, 2020 at 6:28 AM Christoph M. Becker wrote: > > It seems to me that the RFC is not sufficiently specific enough > regarding the concatenation of instances of classes which implement > __toString(). Exactly what I was thinking too. Would be nice with some examples on this. > So if we ever wanted to change the value of > PHP_OPERAND_TYPES_NOT_SUPPORTED, we'd introduce a BC break. Therefore > the constant's value likely will never change, so using NULL directly to > signal unsupported operand types would be fine, wouldn't it? Agree on this too.