3v4l.org

run code in 300+ PHP versions simultaneously
<?php $content = '只支持干洗。<a href="http://www.amazon.com/gp/product/B006VB0KFC?t=mgpyhxigua-20&#038;tag=mgpyhxigua-20&#038;m=ATVPDKIKX0DER" target="_blank">Amazon</a>今日售价$58.58,尺码不多了。</p>'; preg_match('@href=".*?/(dp|product)/(.*?)(/|%3F|\?).*?"@',$content,$m); $template = '[cookie-jar link="{url}" ctr="80" expire="1" period="d"]'; echo $tpl = str_replace('{url}','http://www.amazon.com/dp/'.$m[2].'?tag=52mh-20',$template);
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/TnPOt
function name:  (null)
number of ops:  18
compiled vars:  !0 = $content, !1 = $m, !2 = $template, !3 = $tpl
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    2     0  E >   ASSIGN                                                   !0, '%E5%8F%AA%E6%94%AF%E6%8C%81%E5%B9%B2%E6%B4%97%E3%80%82%3Ca+href%3D%22http%3A%2F%2Fwww.amazon.com%2Fgp%2Fproduct%2FB006VB0KFC%3Ft%3Dmgpyhxigua-20%26%23038%3Btag%3Dmgpyhxigua-20%26%23038%3Bm%3DATVPDKIKX0DER%22+target%3D%22_blank%22%3EAmazon%3C%2Fa%3E%E4%BB%8A%E6%97%A5%E5%94%AE%E4%BB%B7%2458.58%EF%BC%8C%E5%B0%BA%E7%A0%81%E4%B8%8D%E5%A4%9A%E4%BA%86%E3%80%82%3C%2Fp%3E'
    3     1        INIT_FCALL                                               'preg_match'
          2        SEND_VAL                                                 '%40href%3D%22.%2A%3F%2F%28dp%7Cproduct%29%2F%28.%2A%3F%29%28%2F%7C%253F%7C%5C%3F%29.%2A%3F%22%40'
          3        SEND_VAR                                                 !0
          4        SEND_REF                                                 !1
          5        DO_ICALL                                                 
    4     6        ASSIGN                                                   !2, '%5Bcookie-jar+link%3D%22%7Burl%7D%22+ctr%3D%2280%22+expire%3D%221%22+period%3D%22d%22%5D'
    5     7        INIT_FCALL                                               'str_replace'
          8        SEND_VAL                                                 '%7Burl%7D'
          9        FETCH_DIM_R                                      ~7      !1, 2
         10        CONCAT                                           ~8      'http%3A%2F%2Fwww.amazon.com%2Fdp%2F', ~7
         11        CONCAT                                           ~9      ~8, '%3Ftag%3D52mh-20'
         12        SEND_VAL                                                 ~9
         13        SEND_VAR                                                 !2
         14        DO_ICALL                                         $10     
         15        ASSIGN                                           ~11     !3, $10
         16        ECHO                                                     ~11
         17      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
153.77 ms | 1395 KiB | 17 Q