w3resource

PHP: var_export() function

Description

The var_export() function is used to get structured information (only value) of a variable.

Version:

(PHP 4 and above)

Syntax:

var_export(variable_name, set_value)

Parameter:

Name Description Required /
Optional
Type
variable_name The variable being exported. Required String
set_value If this parameter is used and set to true var_export() function returns the variable representation instead of outputting it. Optional Boolean

Return value:

The variable representation, provided set_value is used.

Value Type: Mixed*

*Mixed : mixed indicates that a parameter may accept multiple (but not necessarily all) types.

Example:

<?php
$var_name1=678;
$var_name2='a678';
$var_name3='678';
$var_name4='W3resource.com';
$var_name5=698.99;
$var_name6=+125689.66;
echo var_export($var_name1)."<br>";
echo var_export($var_name2)."<br>";
echo var_export($var_name2)."<br>";
echo var_export($var_name3)."<br>";
echo var_export($var_name4)."<br>";
echo var_export($var_name5)."<br>";
echo var_export($var_name6)."<br>";
?>

Output :

678
'a678'
'a678'
'678'
'W3resource.com'
698.99
125689.66

View the example in the browser

Practice here online :

See also

PHP Function Reference

Previous: var_dump
Next: FTP Functions ftp_alloc



PHP: Tips of the Day

SQL injection that gets around mysql_real_escape_string()

Consider the following query:

$iId = mysql_real_escape_string("1 OR 1=1");    
$sSql = "SELECT * FROM table WHERE id = $iId";

mysql_real_escape_string() will not protect you against this. The fact that you use single quotes (' ') around your variables inside your query is what protects you against this. The following is also an option:

$iId = (int)"1 OR 1=1";
$sSql = "SELECT * FROM table WHERE id = $iId";

Ref : https://bit.ly/32q3bJ7