3v4l.org

run code in 300+ PHP versions simultaneously
<?php $key = "e\^1s&V)F|<\40MTIzNDU2cXdlcnQ="; $decode = base64_decode(substr($key,intval($key[0],16))); echo $decode;
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/aqSCq
function name:  (null)
number of ops:  16
compiled vars:  !0 = $key, !1 = $decode
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    3     0  E >   ASSIGN                                                   !0, 'e%5C%5E1s%26V%29F%7C%3C+MTIzNDU2cXdlcnQ%3D'
    4     1        INIT_FCALL                                               'base64_decode'
          2        INIT_FCALL                                               'substr'
          3        SEND_VAR                                                 !0
          4        INIT_FCALL                                               'intval'
          5        FETCH_DIM_R                                      ~3      !0, 0
          6        SEND_VAL                                                 ~3
          7        SEND_VAL                                                 16
          8        DO_ICALL                                         $4      
          9        SEND_VAR                                                 $4
         10        DO_ICALL                                         $5      
         11        SEND_VAR                                                 $5
         12        DO_ICALL                                         $6      
         13        ASSIGN                                                   !1, $6
    5    14        ECHO                                                     !1
         15      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
166.34 ms | 1394 KiB | 19 Q