Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:119611 Return-Path: Delivered-To: mailing list internals@lists.php.net Received: (qmail 77869 invoked from network); 28 Feb 2023 07:45:16 -0000 Received: from unknown (HELO php-smtp4.php.net) (45.112.84.5) by pb1.pair.com with SMTP; 28 Feb 2023 07:45:16 -0000 Received: from php-smtp4.php.net (localhost [127.0.0.1]) by php-smtp4.php.net (Postfix) with ESMTP id 6F7B618033A for ; Mon, 27 Feb 2023 23:45:15 -0800 (PST) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on php-smtp4.php.net X-Spam-Level: X-Spam-Status: No, score=-0.0 required=5.0 tests=BAYES_50,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.2 X-Spam-ASN: AS20546 62.201.172.0/24 X-Spam-Virus: No X-Envelope-From: Received: from shout02.mail.de (shout02.mail.de [62.201.172.25]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by php-smtp4.php.net (Postfix) with ESMTPS for ; Mon, 27 Feb 2023 23:45:14 -0800 (PST) Received: from postfix03.mail.de (postfix03.bt.mail.de [10.0.121.127]) by shout02.mail.de (Postfix) with ESMTP id 2369EA0363; Tue, 28 Feb 2023 08:45:13 +0100 (CET) Received: from smtp03.mail.de (smtp03.bt.mail.de [10.0.121.213]) by postfix03.mail.de (Postfix) with ESMTP id 044368020A; Tue, 28 Feb 2023 08:45:13 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=mail.de; s=mailde202009; t=1677570313; bh=DqMkFY+RTBn10XDvfqpVClBDHiDiBFF4DIAcBRdeKbI=; h=Message-Id:From:To:Subject:Date:From:To:CC:Subject:Reply-To; b=V0R2VPM3uWKFmfV/jqq1kBCS1ZoFVxvmD5rc2S2/QxH8Kel/c/2FOdVEjwlCUbmBz DU07CkEUo73v3D7tkUeEALfUk297w1QJxZidUA+flcctawC71P5RC/1UcmvSu6zVJV oKBVjVxfBNMv8jDS26WDtyUIEughsAFftBYdntIGy0pm4e/RLBGwof5Me6QzEJyUaS yPvvMutI782CXwUfCungjw8izrO2qa6lShHdowCBSg834Ul0uk9XdjdcUsUAnKCUmG nrSD+WY2De/AQYmvyPaT9oAOj+jUfxbebTIiVHnS2a4hITbiqJzZ8CgdxL5eL2y22w fdJWXtXDX8ZJQ== Received: from [127.0.0.1] (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (No client certificate requested) by smtp03.mail.de (Postfix) with ESMTPSA id C19AEA032D; Tue, 28 Feb 2023 08:45:12 +0100 (CET) Message-ID: To: karoly@negyesi.net, internals@lists.php.net X-Priority: 3 In-Reply-To: References: Date: Tue, 28 Feb 2023 08:45:12 +0100 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Content-Disposition: inline MIME-Version: 1.0 X-purgate: clean X-purgate: This mail is considered clean (visit http://www.eleven.de for further information) X-purgate-type: clean X-purgate-Ad: Categorized by eleven eXpurgate (R) http://www.eleven.de X-purgate: This mail is considered clean (visit http://www.eleven.de for further information) X-purgate: clean X-purgate-size: 573 X-purgate-ID: 154282::1677570312-C134B647-AAB92E19/0/0 Subject: Re: [PHP-DEV] Steal labelled break and continue from zig? From: naitsirch@e.mail.de =0AAm 27-Feb-2023 23:37:29 +0100 schrieb karoly@negyesi.net:=0A> Hello,= =0A> =0A> As I was reading https://kristoff.it/blog/zig-multi-sequence-f= or-loops/ I=0A> found a very nice trick which in PHP would be:=0A> =0A>= foo: while ($i--) {=0A> if ($ % 2) break foo;=0A> }=0A> =0A> What do yo= u think?=0A> =0A> Charlie=0A=0AIt looks interesting. But we already have= goto, which could be used in this case, too.=0A=0Awhile ($i--) {=0A = if ($i % 2) goto foo;=0A}=0A=0Afoo:=0A=0AUnfortunately goto does not ha= ve a good image ;-)=0A=0ABest regards=0AChristian