3v4l.org

run code in 300+ PHP versions simultaneously
<?php preg_match('%<((?i)password(?-i))>\s*+(?P<password>.*?)\s*</\1>%', '<Password> toto </Password>', $match); var_dump($match);
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/ejsfE
function name:  (null)
number of ops:  9
compiled vars:  !0 = $match
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    2     0  E >   INIT_FCALL                                               'preg_match'
          1        SEND_VAL                                                 '%25%3C%28%28%3Fi%29password%28%3F-i%29%29%3E%5Cs%2A%2B%28%3FP%3Cpassword%3E.%2A%3F%29%5Cs%2A%3C%2F%5C1%3E%25'
          2        SEND_VAL                                                 '%3CPassword%3E++toto+++%3C%2FPassword%3E'
          3        SEND_REF                                                 !0
          4        DO_ICALL                                                 
    3     5        INIT_FCALL                                               'var_dump'
          6        SEND_VAR                                                 !0
          7        DO_ICALL                                                 
          8      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
157.84 ms | 1393 KiB | 17 Q