3v4l.org

run code in 300+ PHP versions simultaneously
<?php $json = ' { "email": "shahzad@ovadamd.com", "password": "admin123", "password_confirmation": "admin123", "status": 0, "first_name": "Shahzad", "middle_name": "Hussain", "last_name": "Shah", "date_of_birth": "2015-01-01", "gender": "M", "area_id": 1, "address": "Minhatten NY", "city": "New York", "state": "Washington", "zip": "12312", "fax": "111-111-1111", "phone_extension": "2471", "work_phone": "111-111-1111", "phone_no": "111-111-1111", "emergency_contact": "111-111-1111", "social_security": "111-11-1111", "module_id": 1, "role_id": 1, "speciality_id": 1, "facility_id": 1, "priv_title": "can edit doctor", "priv_key": "ced", "display_group": "Doctor", "prev_id" :1 }'; $arr = array_combine(["user_profile", "prev"], array_chunk(json_decode($json, true),22, true)); var_dump($arr);
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/Zp26m
function name:  (null)
number of ops:  19
compiled vars:  !0 = $json, !1 = $arr
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    3     0  E >   ASSIGN                                                   !0, '++%7B%0A%22email%22%3A+%22shahzad%40ovadamd.com%22%2C%0A%22password%22%3A+%22admin123%22%2C%0A%22password_confirmation%22%3A+%22admin123%22%2C%0A%22status%22%3A+0%2C%0A%22first_name%22%3A+%22Shahzad%22%2C%0A%22middle_name%22%3A+%22Hussain%22%2C%0A%22last_name%22%3A+%22Shah%22%2C%0A%22date_of_birth%22%3A+%222015-01-01%22%2C%0A%22gender%22%3A+%22M%22%2C%0A%22area_id%22%3A+1%2C%0A%22address%22%3A+%22Minhatten+NY%22%2C%0A%22city%22%3A+%22New+York%22%2C%0A%22state%22%3A+%22Washington%22%2C%0A%22zip%22%3A+%2212312%22%2C%0A%22fax%22%3A+%22111-111-1111%22%2C%0A%22phone_extension%22%3A+%222471%22%2C%0A%22work_phone%22%3A+%22111-111-1111%22%2C%0A%22phone_no%22%3A+%22111-111-1111%22%2C%0A%22emergency_contact%22%3A+%22111-111-1111%22%2C%0A%22social_security%22%3A+%22111-11-1111%22%2C%0A%22module_id%22%3A+1%2C%0A%22role_id%22%3A+1%2C%0A%22speciality_id%22%3A+1%2C%0A%22facility_id%22%3A+1%2C%0A%22priv_title%22%3A+%22can+edit+doctor%22%2C%0A%22priv_key%22%3A+%22ced%22%2C%0A%22display_group%22%3A+%22Doctor%22%2C%0A%22prev_id%22+%3A1%0A++++%7D'
   34     1        INIT_FCALL                                               'array_combine'
          2        SEND_VAL                                                 <array>
          3        INIT_FCALL                                               'array_chunk'
          4        INIT_FCALL                                               'json_decode'
          5        SEND_VAR                                                 !0
          6        SEND_VAL                                                 <true>
          7        DO_ICALL                                         $3      
          8        SEND_VAR                                                 $3
          9        SEND_VAL                                                 22
         10        SEND_VAL                                                 <true>
         11        DO_ICALL                                         $4      
         12        SEND_VAR                                                 $4
         13        DO_ICALL                                         $5      
         14        ASSIGN                                                   !1, $5
   35    15        INIT_FCALL                                               'var_dump'
         16        SEND_VAR                                                 !1
         17        DO_ICALL                                                 
         18      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
129.03 ms | 1003 KiB | 17 Q