3v4l.org

run code in 300+ PHP versions simultaneously
<?php $mydata = 'a:12:{s:12:"base_confing";s:0:"";s:7:"enabled";s:2:"yes";s:5:"title";s:15:"بانک ملت";s:11:"description";s:117:"پرداخت امن به وسیله کلیه کارت های عضو شتاب از طریق درگاه بانک ملت";s:15:"account_confing";s:0:"";s:8:"terminal";s:13:"jafarterminal";s:8:"username";s:9:"jafaruser";s:8:"password";s:9:"jafarpass";s:15:"payment_confing";s:0:"";s:15:"success_massage";s:83:"با تشکر از شما . سفارش شما با موفقیت پرداخت شد .";s:14:"failed_massage";s:178:"پرداخت شما ناموفق بوده است . لطفا مجددا تلاش نمایید یا در صورت بروز اشکال با مدیر سایت تماس بگیرید .";s:17:"cancelled_massage";s:79:"پرداخت به دلیل انصراف شما ناتمام باقی ماند .";};}'; $mydata = unserialize($mydata); echo $mydata['enabled'];
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/lK1R2
function name:  (null)
number of ops:  8
compiled vars:  !0 = $mydata
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    3     0  E >   ASSIGN                                                   !0, 'a%3A12%3A%7Bs%3A12%3A%22base_confing%22%3Bs%3A0%3A%22%22%3Bs%3A7%3A%22enabled%22%3Bs%3A2%3A%22yes%22%3Bs%3A5%3A%22title%22%3Bs%3A15%3A%22%D8%A8%D8%A7%D9%86%DA%A9+%D9%85%D9%84%D8%AA%22%3Bs%3A11%3A%22description%22%3Bs%3A117%3A%22%D9%BE%D8%B1%D8%AF%D8%A7%D8%AE%D8%AA+%D8%A7%D9%85%D9%86+%D8%A8%D9%87+%D9%88%D8%B3%DB%8C%D9%84%D9%87+%DA%A9%D9%84%DB%8C%D9%87+%DA%A9%D8%A7%D8%B1%D8%AA+%D9%87%D8%A7%DB%8C+%D8%B9%D8%B6%D9%88+%D8%B4%D8%AA%D8%A7%D8%A8+%D8%A7%D8%B2+%D8%B7%D8%B1%DB%8C%D9%82+%D8%AF%D8%B1%DA%AF%D8%A7%D9%87+%D8%A8%D8%A7%D9%86%DA%A9+%D9%85%D9%84%D8%AA%22%3Bs%3A15%3A%22account_confing%22%3Bs%3A0%3A%22%22%3Bs%3A8%3A%22terminal%22%3Bs%3A13%3A%22jafarterminal%22%3Bs%3A8%3A%22username%22%3Bs%3A9%3A%22jafaruser%22%3Bs%3A8%3A%22password%22%3Bs%3A9%3A%22jafarpass%22%3Bs%3A15%3A%22payment_confing%22%3Bs%3A0%3A%22%22%3Bs%3A15%3A%22success_massage%22%3Bs%3A83%3A%22%D8%A8%D8%A7+%D8%AA%D8%B4%DA%A9%D8%B1+%D8%A7%D8%B2+%D8%B4%D9%85%D8%A7+.+%D8%B3%D9%81%D8%A7%D8%B1%D8%B4+%D8%B4%D9%85%D8%A7+%D8%A8%D8%A7+%D9%85%D9%88%D9%81%D9%82%DB%8C%D8%AA+%D9%BE%D8%B1%D8%AF%D8%A7%D8%AE%D8%AA+%D8%B4%D8%AF+.%22%3Bs%3A14%3A%22failed_massage%22%3Bs%3A178%3A%22%D9%BE%D8%B1%D8%AF%D8%A7%D8%AE%D8%AA+%D8%B4%D9%85%D8%A7+%D9%86%D8%A7%D9%85%D9%88%D9%81%D9%82+%D8%A8%D9%88%D8%AF%D9%87+%D8%A7%D8%B3%D8%AA+.+%D9%84%D8%B7%D9%81%D8%A7+%D9%85%D8%AC%D8%AF%D8%AF%D8%A7+%D8%AA%D9%84%D8%A7%D8%B4+%D9%86%D9%85%D8%A7%DB%8C%DB%8C%D8%AF+%DB%8C%D8%A7+%D8%AF%D8%B1+%D8%B5%D9%88%D8%B1%D8%AA+%D8%A8%D8%B1%D9%88%D8%B2+%D8%A7%D8%B4%DA%A9%D8%A7%D9%84+%D8%A8%D8%A7+%D9%85%D8%AF%DB%8C%D8%B1+%D8%B3%D8%A7%DB%8C%D8%AA+%D8%AA%D9%85%D8%A7%D8%B3+%D8%A8%DA%AF%DB%8C%D8%B1%DB%8C%D8%AF+.%22%3Bs%3A17%3A%22cancelled_massage%22%3Bs%3A79%3A%22%D9%BE%D8%B1%D8%AF%D8%A7%D8%AE%D8%AA+%D8%A8%D9%87+%D8%AF%D9%84%DB%8C%D9%84+%D8%A7%D9%86%D8%B5%D8%B1%D8%A7%D9%81+%D8%B4%D9%85%D8%A7+%D9%86%D8%A7%D8%AA%D9%85%D8%A7%D9%85+%D8%A8%D8%A7%D9%82%DB%8C+%D9%85%D8%A7%D9%86%D8%AF+.%22%3B%7D%3B%7D'
    4     1        INIT_FCALL                                               'unserialize'
          2        SEND_VAR                                                 !0
          3        DO_ICALL                                         $2      
          4        ASSIGN                                                   !0, $2
    5     5        FETCH_DIM_R                                      ~4      !0, 'enabled'
          6        ECHO                                                     ~4
          7      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
166.14 ms | 1387 KiB | 15 Q