Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:89967 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 69670 invoked from network); 3 Jan 2016 02:14:48 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 3 Jan 2016 02:14:48 -0000 Authentication-Results: pb1.pair.com smtp.mail=php@golemon.com; spf=softfail; sender-id=softfail Authentication-Results: pb1.pair.com header.from=php@golemon.com; sender-id=softfail Received-SPF: softfail (pb1.pair.com: domain golemon.com does not designate 209.85.217.174 as permitted sender) X-PHP-List-Original-Sender: php@golemon.com X-Host-Fingerprint: 209.85.217.174 mail-lb0-f174.google.com Received: from [209.85.217.174] ([209.85.217.174:33756] helo=mail-lb0-f174.google.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id 89/02-33667-61488865 for ; Sat, 02 Jan 2016 21:14:47 -0500 Received: by mail-lb0-f174.google.com with SMTP id sv6so137987012lbb.0 for ; Sat, 02 Jan 2016 18:14:46 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=golemon-com.20150623.gappssmtp.com; s=20150623; h=mime-version:sender:date:message-id:subject:from:to:content-type; bh=7lesqcbt5LbTl2NWRVwC7rmoaFXWNG8OinM7X1rlekE=; b=KCMbz9Ux/KHYYryvT/ZA7uT+Igr2aTe5uRETVW0gNQAjFGSmnUGcEgwvgYxe4qox8B /33B+9rxYLRY9MddC0a5KCNytfhQWD3wTVWFxbWRqIyZxM7pXa1+LFCUN2oLLp5sK51N Ai14JI5hWZex9hCjc9GZJ+pR3W0rlnp4Lb1ULPHJ5WHqjpOtXLhOARk3pc3KLOB6A3Cj CbshSGoKD73/Gu2p3mjFeKGRXIETyCCQZIMzc0B7DDIsWOurJVDBrqDx6A52zVO3P+AE wlr/g8QGiwmmcyErVW6N1K2rAbU9bWfXV2MnWi4M30hRTHPZOy9Lx0lm4iXvnuJTmwNB VZVw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:sender:date:message-id:subject:from :to:content-type; bh=7lesqcbt5LbTl2NWRVwC7rmoaFXWNG8OinM7X1rlekE=; b=FnIf84awhVHtKdTuWCCKXoGOAUMGfMRMomlZ5dyLZGOZRrX8nBplb/AqClJ8zPG5EB H5C5n4bAmJ6Nj7kT+uhkxSVt26H7dLWrnlDhncCu0LUU3NOHmfwd1IrhX+/orYv1Vz9R d4eImswVXCRloVhAhrrSVtEKJGXq8wHk/NKS/Ww8Cal9KcVmNUAPUmlWkI4PvCyARabQ KZCTpxmL0V+OSOMNdRf+QAUaur/jKC2cHjAickMutV+W/c2LJJCCdNiBpzBI0cxTgZHh nMzrGgT3oydZN+s/t6CrsDTU9L5Ee7J83bEo7/IGdReLj/zPwc21jRzr5muvwt4QORb1 ORCg== X-Gm-Message-State: ALoCoQn+qZoI/56WwD7lbE0cqr/YOG0lU8iIS7HXZLUSuzlvylRs5a09GB/+S+Nf2VoUtX1G2DmgAlg2HqG82wUo68GzGhxfJg== MIME-Version: 1.0 X-Received: by 10.112.137.132 with SMTP id qi4mr30052379lbb.120.1451787282524; Sat, 02 Jan 2016 18:14:42 -0800 (PST) Sender: php@golemon.com Received: by 10.112.37.44 with HTTP; Sat, 2 Jan 2016 18:14:42 -0800 (PST) X-Originating-IP: [2620:10d:c090:180::b52c] Date: Sat, 2 Jan 2016 18:14:42 -0800 X-Google-Sender-Auth: 1V57jiLQUdE_05ZhN4poqvTmwR4 Message-ID: To: PHP internals , patriciotarantino@gmail.com Content-Type: text/plain; charset=UTF-8 Subject: RFC Operator Overloading in Userspace From: pollita@php.net (Sara Golemon) Patricio Tarantino has asked me to help him propose Operator Overloading in PHP 7.1 (based in part on my operator extension in PECL). I think we can expose this to usespace as magic methods with very little overhead (the runtime check and dispatch is already there, after all). I do think that the "Future Expansion" section bears following through with as well, but the basic set of methods already hooked for GMP would be a nice start. https://wiki.php.net/rfc/operator-overloading -Sara