3v4l.org

run code in 300+ PHP versions simultaneously
<?php function base64UrlDecode($input) { return base64_decode(strtr($input, '-_', '+/')); } $signed_request = 'rs25bODttOJd3JIA8EW7xSA-wDNJGVBqallNSqftfxA.eyJpbnN0YW5jZUlkIjoiMTJlODMwNzAtNmRhNy0yNjU1LWVhNTktODc0MWZjYmQ1MWFkIiwic2lnbkRhdGUiOiIyMDE0LTAyLTA2VDAxOjE0OjI4LjMwNC0wNjowMCIsInVpZCI6IjBhNGZiZjFhLTRkNDMtNDU1ZC1iMzk5LTFkOTA0MTgyZWZjMiIsInBlcm1pc3Npb25zIjoiT1dORVIiLCJpcEFuZFBvcnQiOiIyMTIuMjkuMTkyLjE0LzY1Mjg1IiwidmVuZG9yUHJvZHVjdElkIjoiIiwiZGVtb01vZGUiOmZhbHNlfQ'; list($encoded_sig, $payload) = explode('.', $signed_request, 2); $sig = base64UrlDecode($encoded_sig); $data = json_decode(base64UrlDecode($payload), true); $expected_sig = hash_hmac('sha256', $payload, $this->secret, $raw = true); echo $expected_sig;
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/14lsP
function name:  (null)
number of ops:  35
compiled vars:  !0 = $signed_request, !1 = $encoded_sig, !2 = $payload, !3 = $sig, !4 = $data, !5 = $expected_sig, !6 = $raw
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    7     0  E >   ASSIGN                                                   !0, 'rs25bODttOJd3JIA8EW7xSA-wDNJGVBqallNSqftfxA.eyJpbnN0YW5jZUlkIjoiMTJlODMwNzAtNmRhNy0yNjU1LWVhNTktODc0MWZjYmQ1MWFkIiwic2lnbkRhdGUiOiIyMDE0LTAyLTA2VDAxOjE0OjI4LjMwNC0wNjowMCIsInVpZCI6IjBhNGZiZjFhLTRkNDMtNDU1ZC1iMzk5LTFkOTA0MTgyZWZjMiIsInBlcm1pc3Npb25zIjoiT1dORVIiLCJpcEFuZFBvcnQiOiIyMTIuMjkuMTkyLjE0LzY1Mjg1IiwidmVuZG9yUHJvZHVjdElkIjoiIiwiZGVtb01vZGUiOmZhbHNlfQ'
    8     1        INIT_FCALL                                               'explode'
          2        SEND_VAL                                                 '.'
          3        SEND_VAR                                                 !0
          4        SEND_VAL                                                 2
          5        DO_ICALL                                         $8      
          6        FETCH_LIST_R                                     $9      $8, 0
          7        ASSIGN                                                   !1, $9
          8        FETCH_LIST_R                                     $11     $8, 1
          9        ASSIGN                                                   !2, $11
         10        FREE                                                     $8
   10    11        INIT_FCALL                                               'base64urldecode'
         12        SEND_VAR                                                 !1
         13        DO_FCALL                                      0  $13     
         14        ASSIGN                                                   !3, $13
   11    15        INIT_FCALL                                               'json_decode'
         16        INIT_FCALL                                               'base64urldecode'
         17        SEND_VAR                                                 !2
         18        DO_FCALL                                      0  $15     
         19        SEND_VAR                                                 $15
         20        SEND_VAL                                                 <true>
         21        DO_ICALL                                         $16     
         22        ASSIGN                                                   !4, $16
   12    23        INIT_FCALL                                               'hash_hmac'
         24        SEND_VAL                                                 'sha256'
         25        SEND_VAR                                                 !2
         26        FETCH_THIS                                       $18     
         27        FETCH_OBJ_R                                      ~19     $18, 'secret'
         28        SEND_VAL                                                 ~19
         29        ASSIGN                                           ~20     !6, <true>
         30        SEND_VAL                                                 ~20
         31        DO_ICALL                                         $21     
         32        ASSIGN                                                   !5, $21
   13    33        ECHO                                                     !5
         34      > RETURN                                                   1

Function base64urldecode:
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/14lsP
function name:  base64UrlDecode
number of ops:  11
compiled vars:  !0 = $input
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    2     0  E >   RECV                                             !0      
    4     1        INIT_FCALL                                               'base64_decode'
          2        INIT_FCALL                                               'strtr'
          3        SEND_VAR                                                 !0
          4        SEND_VAL                                                 '-_'
          5        SEND_VAL                                                 '%2B%2F'
          6        DO_ICALL                                         $1      
          7        SEND_VAR                                                 $1
          8        DO_ICALL                                         $2      
          9      > RETURN                                                   $2
    5    10*     > RETURN                                                   null

End of function base64urldecode

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
156.38 ms | 1394 KiB | 25 Q