3v4l.org

run code in 300+ PHP versions simultaneously
<?php function chk($word) { echo PHP_EOL . 'Word: ' . $word . PHP_EOL; echo 'pattern: 1.' . PHP_EOL; if (preg_match('/^.*[0-90-9]$/u', $word)) { echo 'Ok.' . PHP_EOL; } else { echo 'Ng.' . PHP_EOL; }; echo 'pattern: 2.' . PHP_EOL; if (preg_match('/^[0-90-9]+$/u', $word)) { echo 'Ok.' . PHP_EOL; } else { echo 'Ng.' . PHP_EOL; }; } chk('abc12345'); chk('abc12345'); chk('12345'); chk('12345'); chk('1122334455');
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/b7skh
function name:  (null)
number of ops:  16
compiled vars:  none
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
   21     0  E >   INIT_FCALL                                               'chk'
          1        SEND_VAL                                                 'abc12345'
          2        DO_FCALL                                      0          
   22     3        INIT_FCALL                                               'chk'
          4        SEND_VAL                                                 '%EF%BD%81%EF%BD%82%EF%BD%83%EF%BC%91%EF%BC%92%EF%BC%93%EF%BC%94%EF%BC%95'
          5        DO_FCALL                                      0          
   23     6        INIT_FCALL                                               'chk'
          7        SEND_VAL                                                 '12345'
          8        DO_FCALL                                      0          
   24     9        INIT_FCALL                                               'chk'
         10        SEND_VAL                                                 '%EF%BC%91%EF%BC%92%EF%BC%93%EF%BC%94%EF%BC%95'
         11        DO_FCALL                                      0          
   25    12        INIT_FCALL                                               'chk'
         13        SEND_VAL                                                 '1%EF%BC%912%EF%BC%923%EF%BC%934%EF%BC%945%EF%BC%95'
         14        DO_FCALL                                      0          
         15      > RETURN                                                   1

Function chk:
Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 43) Position 1 = 10, Position 2 = 12
Branch analysis from position: 10
1 jumps found. (Code = 42) Position 1 = 13
Branch analysis from position: 13
2 jumps found. (Code = 43) Position 1 = 19, Position 2 = 21
Branch analysis from position: 19
1 jumps found. (Code = 42) Position 1 = 22
Branch analysis from position: 22
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 21
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 12
2 jumps found. (Code = 43) Position 1 = 19, Position 2 = 21
Branch analysis from position: 19
Branch analysis from position: 21
filename:       /in/b7skh
function name:  chk
number of ops:  23
compiled vars:  !0 = $word
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    3     0  E >   RECV                                             !0      
    4     1        CONCAT                                           ~1      '%0AWord%3A+', !0
          2        CONCAT                                           ~2      ~1, '%0A'
          3        ECHO                                                     ~2
    5     4        ECHO                                                     'pattern%3A+1.%0A'
    6     5        INIT_FCALL                                               'preg_match'
          6        SEND_VAL                                                 '%2F%5E.%2A%5B0-9%EF%BC%90-%EF%BC%99%5D%24%2Fu'
          7        SEND_VAR                                                 !0
          8        DO_ICALL                                         $3      
          9      > JMPZ                                                     $3, ->12
    7    10    >   ECHO                                                     'Ok.%0A'
    6    11      > JMP                                                      ->13
   10    12    >   ECHO                                                     'Ng.%0A'
   12    13    >   ECHO                                                     'pattern%3A+2.%0A'
   13    14        INIT_FCALL                                               'preg_match'
         15        SEND_VAL                                                 '%2F%5E%5B0-9%EF%BC%90-%EF%BC%99%5D%2B%24%2Fu'
         16        SEND_VAR                                                 !0
         17        DO_ICALL                                         $4      
         18      > JMPZ                                                     $4, ->21
   14    19    >   ECHO                                                     'Ok.%0A'
   13    20      > JMP                                                      ->22
   17    21    >   ECHO                                                     'Ng.%0A'
   19    22    > > RETURN                                                   null

End of function chk

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
157.94 ms | 1012 KiB | 19 Q