3v4l.org

run code in 300+ PHP versions simultaneously
<?php $obj = unserialize('O:8:"stdClass":2:{s:11:"xmlrpc_type";s:6:"base64";s:6:"scalar";R:1;}'); var_dump(xmlrpc_encode($obj));
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/9YKse
function name:  (null)
number of ops:  11
compiled vars:  !0 = $obj
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    2     0  E >   INIT_FCALL                                               'unserialize'
          1        SEND_VAL                                                 'O%3A8%3A%22stdClass%22%3A2%3A%7Bs%3A11%3A%22xmlrpc_type%22%3Bs%3A6%3A%22base64%22%3Bs%3A6%3A%22scalar%22%3BR%3A1%3B%7D'
          2        DO_ICALL                                         $1      
          3        ASSIGN                                                   !0, $1
    3     4        INIT_FCALL                                               'var_dump'
          5        INIT_FCALL_BY_NAME                                       'xmlrpc_encode'
          6        SEND_VAR_EX                                              !0
          7        DO_FCALL                                      0  $3      
          8        SEND_VAR                                                 $3
          9        DO_ICALL                                                 
         10      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
211.43 ms | 1398 KiB | 17 Q