<?php
$filter = array(
"grant_type" => array("filter" => FILTER_VALIDATE_REGEXP, "options" => array("regexp" => "/^(authorization_code|password|assertion|refresh_token|none)$/"), "flags" => FILTER_REQUIRE_SCALAR),
"scope" => array("flags" => FILTER_REQUIRE_SCALAR),
"code" => array("flags" => FILTER_REQUIRE_SCALAR),
"redirect_uri" => array("filter" => FILTER_SANITIZE_URL),
"username" => array("flags" => FILTER_REQUIRE_SCALAR),
"password" => array("flags" => FILTER_REQUIRE_SCALAR),
"assertion_type" => array("flags" => FILTER_REQUIRE_SCALAR),
"assertion" => array("flags" => FILTER_REQUIRE_SCALAR),
"refresh_token" => array("flags" => FILTER_REQUIRE_SCALAR),
"user_id" => array("filter" => FILTER_VALIDATE_INT),
);
$_GET["code"] = "asf234r23r";
$arResult = filter_input_array(INPUT_GET, $filter);
var_dump($arResult);
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename: /in/j6LBF
function name: (null)
number of ops: 13
compiled vars: !0 = $filter, !1 = $arResult
line #* E I O op fetch ext return operands
-------------------------------------------------------------------------------------
2 0 E > ASSIGN !0, <array>
15 1 FETCH_W global $3 '_GET'
2 ASSIGN_DIM $3, 'code'
3 OP_DATA 'asf234r23r'
16 4 INIT_FCALL 'filter_input_array'
5 SEND_VAL 1
6 SEND_VAR !0
7 DO_ICALL $5
8 ASSIGN !1, $5
17 9 INIT_FCALL 'var_dump'
10 SEND_VAR !1
11 DO_ICALL
12 > RETURN 1
Generated using Vulcan Logic Dumper, using php 8.0.0
preferences:
170.44 ms | 1394 KiB | 17 Q