3v4l.org

run code in 300+ PHP versions simultaneously
<?php unserialize('a:4:{i:0;s:8:"password";i:1;s:13:"refresh_token";i:2;s:5:"token";i:3;s:18:"client_credentials";}');
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/upktE
function name:  (null)
number of ops:  4
compiled vars:  none
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    3     0  E >   INIT_FCALL                                               'unserialize'
          1        SEND_VAL                                                 'a%3A4%3A%7Bi%3A0%3Bs%3A8%3A%22password%22%3Bi%3A1%3Bs%3A13%3A%22refresh_token%22%3Bi%3A2%3Bs%3A5%3A%22token%22%3Bi%3A3%3Bs%3A18%3A%22client_credentials%22%3B%7D'
          2        DO_ICALL                                                 
          3      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
154.03 ms | 1393 KiB | 15 Q