3v4l.org

run code in 300+ PHP versions simultaneously
<?php $string = "Cookie: PDAuth=123asd4fsd2hgg3jk4jkl55l"; preg_match("/PDAuth=.*^/", $string, $match); print_r($match);
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/87L2O
function name:  (null)
number of ops:  10
compiled vars:  !0 = $string, !1 = $match
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    2     0  E >   ASSIGN                                                   !0, 'Cookie%3A+PDAuth%3D123asd4fsd2hgg3jk4jkl55l'
    3     1        INIT_FCALL                                               'preg_match'
          2        SEND_VAL                                                 '%2FPDAuth%3D.%2A%5E%2F'
          3        SEND_VAR                                                 !0
          4        SEND_REF                                                 !1
          5        DO_ICALL                                                 
    4     6        INIT_FCALL                                               'print_r'
          7        SEND_VAR                                                 !1
          8        DO_ICALL                                                 
          9      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
183.26 ms | 1393 KiB | 17 Q