3v4l.org

run code in 300+ PHP versions simultaneously
<?php $str = "PD-W3-SSO-ID"; if ( ! preg_match("/^[a-zA-Z0-9:_\/-|\.]+$/i", $str)) { echo 'Disallowed Key Characters.'. $str; }
Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 43) Position 1 = 7, Position 2 = 9
Branch analysis from position: 7
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 9
filename:       /in/SQNe3
function name:  (null)
number of ops:  10
compiled vars:  !0 = $str
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    3     0  E >   ASSIGN                                                   !0, 'PD-W3-SSO-ID'
    4     1        INIT_FCALL                                               'preg_match'
          2        SEND_VAL                                                 '%2F%5E%5Ba-zA-Z0-9%3A_%5C%2F-%7C%5C.%5D%2B%24%2Fi'
          3        SEND_VAR                                                 !0
          4        DO_ICALL                                         $2      
          5        BOOL_NOT                                         ~3      $2
          6      > JMPZ                                                     ~3, ->9
    6     7    >   CONCAT                                           ~4      'Disallowed+Key+Characters.', !0
          8        ECHO                                                     ~4
    7     9    > > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
149.6 ms | 1398 KiB | 15 Q