3v4l.org

run code in 300+ PHP versions simultaneously
<?php $page = '{"token":"{\"adblock\":false,\"player_type\":null,\"platform\":null,\"user_id\":104297154,\"channel\":\"monstercat\",\"expires\":1478281521,\"chansub\":{\"view_until\":1924905600,\"restricted_bitrates\":[]},\"private\":{\"allowed_to_view\":true},\"privileged\":false,\"source_restricted\":false,\"https_required\":false,\"show_ads\":true,\"device_id\":\"abde53bf9e4af067\"}","sig":"e3281418c5cedc04b47b1181e56108388c95227c","mobile_restricted":false}'; $json = json_decode($page, true); $token = $json['token']; $sig = $json['sig']; echo 'token=' . rawurlencode($token) . '&sig=' . $sig;
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/H3apT
function name:  (null)
number of ops:  18
compiled vars:  !0 = $page, !1 = $json, !2 = $token, !3 = $sig
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    3     0  E >   ASSIGN                                                   !0, '%7B%22token%22%3A%22%7B%5C%22adblock%5C%22%3Afalse%2C%5C%22player_type%5C%22%3Anull%2C%5C%22platform%5C%22%3Anull%2C%5C%22user_id%5C%22%3A104297154%2C%5C%22channel%5C%22%3A%5C%22monstercat%5C%22%2C%5C%22expires%5C%22%3A1478281521%2C%5C%22chansub%5C%22%3A%7B%5C%22view_until%5C%22%3A1924905600%2C%5C%22restricted_bitrates%5C%22%3A%5B%5D%7D%2C%5C%22private%5C%22%3A%7B%5C%22allowed_to_view%5C%22%3Atrue%7D%2C%5C%22privileged%5C%22%3Afalse%2C%5C%22source_restricted%5C%22%3Afalse%2C%5C%22https_required%5C%22%3Afalse%2C%5C%22show_ads%5C%22%3Atrue%2C%5C%22device_id%5C%22%3A%5C%22abde53bf9e4af067%5C%22%7D%22%2C%22sig%22%3A%22e3281418c5cedc04b47b1181e56108388c95227c%22%2C%22mobile_restricted%22%3Afalse%7D'
    4     1        INIT_FCALL                                               'json_decode'
          2        SEND_VAR                                                 !0
          3        SEND_VAL                                                 <true>
          4        DO_ICALL                                         $5      
          5        ASSIGN                                                   !1, $5
    5     6        FETCH_DIM_R                                      ~7      !1, 'token'
          7        ASSIGN                                                   !2, ~7
    6     8        FETCH_DIM_R                                      ~9      !1, 'sig'
          9        ASSIGN                                                   !3, ~9
    7    10        INIT_FCALL                                               'rawurlencode'
         11        SEND_VAR                                                 !2
         12        DO_ICALL                                         $11     
         13        CONCAT                                           ~12     'token%3D', $11
         14        CONCAT                                           ~13     ~12, '%26sig%3D'
         15        CONCAT                                           ~14     ~13, !3
         16        ECHO                                                     ~14
         17      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
177.04 ms | 1395 KiB | 17 Q