3v4l.org

run code in 300+ PHP versions simultaneously
<?php $subject = "https://WBSITE_LINK.com/#access_token=1b6e37716abdh&state=state123&scope=profile%20booking&token_type=bearer&expires_in=15552000"; $a = explode("#", $subject); if (isset($a[1])) { $b = explode("&", $a[1]); if (isset($b[0])) { $c = explode("=", $b[0]); if (isset($c[1])) { echo $c[1]; } } }
Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 43) Position 1 = 8, Position 2 = 26
Branch analysis from position: 8
2 jumps found. (Code = 43) Position 1 = 16, Position 2 = 26
Branch analysis from position: 16
2 jumps found. (Code = 43) Position 1 = 24, Position 2 = 26
Branch analysis from position: 24
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 26
Branch analysis from position: 26
Branch analysis from position: 26
filename:       /in/f8sIM
function name:  (null)
number of ops:  27
compiled vars:  !0 = $subject, !1 = $a, !2 = $b, !3 = $c
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    3     0  E >   ASSIGN                                                   !0, 'https%3A%2F%2FWBSITE_LINK.com%2F%23access_token%3D1b6e37716abdh%26state%3Dstate123%26scope%3Dprofile%2520booking%26token_type%3Dbearer%26expires_in%3D15552000'
    4     1        INIT_FCALL                                               'explode'
          2        SEND_VAL                                                 '%23'
          3        SEND_VAR                                                 !0
          4        DO_ICALL                                         $5      
          5        ASSIGN                                                   !1, $5
    5     6        ISSET_ISEMPTY_DIM_OBJ                         0          !1, 1
          7      > JMPZ                                                     ~7, ->26
    6     8    >   INIT_FCALL                                               'explode'
          9        SEND_VAL                                                 '%26'
         10        FETCH_DIM_R                                      ~8      !1, 1
         11        SEND_VAL                                                 ~8
         12        DO_ICALL                                         $9      
         13        ASSIGN                                                   !2, $9
    7    14        ISSET_ISEMPTY_DIM_OBJ                         0          !2, 0
         15      > JMPZ                                                     ~11, ->26
    8    16    >   INIT_FCALL                                               'explode'
         17        SEND_VAL                                                 '%3D'
         18        FETCH_DIM_R                                      ~12     !2, 0
         19        SEND_VAL                                                 ~12
         20        DO_ICALL                                         $13     
         21        ASSIGN                                                   !3, $13
    9    22        ISSET_ISEMPTY_DIM_OBJ                         0          !3, 1
         23      > JMPZ                                                     ~15, ->26
   10    24    >   FETCH_DIM_R                                      ~16     !3, 1
         25        ECHO                                                     ~16
   13    26    > > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
135.45 ms | 999 KiB | 14 Q