3v4l.org

run code in 300+ PHP versions simultaneously
<?php print_r(simplexml_load_string('<?xml version="1.0" ?><web_browser_passwords><item><url>http://extender1600.local/wireless/basic_ap_setup/basic_ap_setup.html</url><web_browser>Chrome</web_browser><user_name>STRONG_Extender1600_IU8E</user_name><password>e5EUA549m7</password><password_strength>Very Strong</password_strength><user_name_field>networkName_5000</user_name_field><password_field>password_5000</password_field></item><item><url>https://accounts.google.com/ServiceLogin</url><web_browser>Chrome</web_browser><user_name>adasasdsa</user_name><password>asdasdadaada</password><password_strength>Medium</password_strength><user_name_field>identifier</user_name_field><password_field>password</password_field></item></web_browser_passwords>'));
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/qLRfp
function name:  (null)
number of ops:  7
compiled vars:  none
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    5     0  E >   INIT_FCALL                                               'print_r'
          1        INIT_FCALL                                               'simplexml_load_string'
          2        SEND_VAL                                                 '%3C%3Fxml+version%3D%221.0%22+%3F%3E%3Cweb_browser_passwords%3E%3Citem%3E%3Curl%3Ehttp%3A%2F%2Fextender1600.local%2Fwireless%2Fbasic_ap_setup%2Fbasic_ap_setup.html%3C%2Furl%3E%3Cweb_browser%3EChrome%3C%2Fweb_browser%3E%3Cuser_name%3ESTRONG_Extender1600_IU8E%3C%2Fuser_name%3E%3Cpassword%3Ee5EUA549m7%3C%2Fpassword%3E%3Cpassword_strength%3EVery+Strong%3C%2Fpassword_strength%3E%3Cuser_name_field%3EnetworkName_5000%3C%2Fuser_name_field%3E%3Cpassword_field%3Epassword_5000%3C%2Fpassword_field%3E%3C%2Fitem%3E%3Citem%3E%3Curl%3Ehttps%3A%2F%2Faccounts.google.com%2FServiceLogin%3C%2Furl%3E%3Cweb_browser%3EChrome%3C%2Fweb_browser%3E%3Cuser_name%3Eadasasdsa%3C%2Fuser_name%3E%3Cpassword%3Easdasdadaada%3C%2Fpassword%3E%3Cpassword_strength%3EMedium%3C%2Fpassword_strength%3E%3Cuser_name_field%3Eidentifier%3C%2Fuser_name_field%3E%3Cpassword_field%3Epassword%3C%2Fpassword_field%3E%3C%2Fitem%3E%3C%2Fweb_browser_passwords%3E'
          3        DO_ICALL                                         $0      
          4        SEND_VAR                                                 $0
          5        DO_ICALL                                                 
          6      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
142.25 ms | 1005 KiB | 15 Q