The purpose of php bit operators
The following editor will bring you an article on the uses of php bit operators. The editor thinks it is quite good, so I will share it with you now and give it as a reference for everyone. Let’s follow the editor and take a look.
In practical applications, user permissions can be used.
The Permission management method I mentioned here is a commonly used method. , mainly using the "bit operator" operation, the & bit and operator , | bit or operator. If the number involved in the operation is a decimal number, it will be converted into a binary number to participate in the operation, and then the calculation result will be converted into a decimal number and output.
Its permission value is like this
2^0=1, the corresponding 2-digit number is "0001" (here^I Expressed as "power", that is: 2 raised to the 0th power, the same below)
2^1=2, the corresponding 2-ary number is "0010"
2^2=4, the corresponding 2-ary number The number is "0100"
2^3=8, and the corresponding binary number is "1000"
To determine whether a number is within a certain number range, you can use the & operator (the value is from the table above Winning)
For example: 7=4|2|1 (You can also simply understand it as 7=4+2+1)
Use & to operate, you can know that 7&4, 7&2, 7&1 are all true, and if 7&8 is false,
&, | If you are not familiar with it, you should check the manual to see how to use it. Okay
Let’s take a look at an example:
// 赋予权限值-->删除:8、上传:4、写入:2、只读:1 define(“mDELETE”,8); define(“mUPLOAD”,4); define(“mWRITE”,2); define(“mREAD”,1); //vvvvvvvvvvvvv使用说明vvvvvvvvvvvvv //部门经理的权限为(假设它拥有此部门的所有权限),| 是位或运行符,不熟悉的就查查资料 echo mDELETE|mUPLOAD|mWRITE|mREAD ,” “;// 相当于是把上面的权限值加起来:8+4+2+1=15 // 设我只有 upload 和 read 权限,则 echo mUPLOAD|mREAD ,” “;//相当于是把上传、只读的权限值分别相加:4+1=5 /* *赋予它多个权限就分别取得权限值相加,又比如某位员工拥有除了删除外的权限其余都拥有,那它的权限值是多少? *应该是:4+2+1=7 *明白了怎么赋值给权限吧? */ //^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ //判断某人的权限可用,设权限值在$key中 /* *判断权限用&位与符, */ $key = 13;//13=8+4+1 if($key & mDELETE) echo “有删除权限 “; //8 if($key & mUPLOAD) echo “有上传权限 “; //4 $a=$key & mWRITE; echo “有写权限 “.$a; //无此权限 if($key & mREAD) echo “有读权限 “; //1 ?>
OK, one of the algorithms for permission scores is like this. It can be said that Simple and efficient. I don’t know if you understand it or not. It doesn’t matter if you don’t. Just remember the examples. The premise is to distribute the permission values well, that is, 1, 2, 4, 8, 16... (There is also an order issue here. The higher the permission, the higher the permission value, such as the deletion demonstrated in the above example. permissions). With the permission distribution table, you can determine what permissions are given to a person. You can simply understand that which permissions you want, just add the corresponding permission values.
This method is very easy to use. The disadvantage is that if the permissions are distributed finely, the permission value will become larger and larger. Think about it for yourself, how many powers of 2, if all the permissions are required? Add it all up. But for general permissions this is enough.
The following are some simple application examples
(1) Determine whether the int type variable a is an odd or even number
a&1 = 0 even number
a&1 = 1 odd number
(2) Take the k-th bit (k) of int type variable a =0,1,2...sizeof(int)), that is, a>>k&1
##(3) Change the k-th bit of int type variable a Clear 0, that is, a=a&~(1<
<>(4) Change the kth value of int type variable a Position 1, that is, a=a|(1<
<>(5) The int variable is circularly shifted to the left k times , that is, a=a<>16-k (assuming sizeof(int)=16)
(6) The int type variable a loops to the right k times , that is, a=a>>k|a<<16-k (assuming sizeof(int)=16)
For two integers x, y, if you use (x+y)/2 to find the average, overflow will occur because x+y may Greater than INT_MAX, but we know that their average value will definitely not overflow. We use the following algorithm:int average(int x, int y) //返回X,Y 的平均值 { return (x&y)+((x^y)>>1); }
(8) To determine whether an integer is a power of 2, for a number x >= 0, determine whether it is a power of 2
boolean power2(int x) { return ((x&(x-1))==0)&&(x!=0); }
(9) Exchange two integers without temp
void swap(int x , int y) { x ^= y; y ^= x; x ^= y; }
(10) Calculate the absolute value
int abs( int x ) { int y ; y = x >> 31 ; return (x^y)-y ; //or: (x+y)^y }
(11) Modulo operation is converted into bit operation (Without overflow)##a % (2^n) is equivalent to a & (2^n – 1)
(12) Multiplication operations are converted into bit operations (without overflow)a * (2^n) is equivalent to a<< n
(13) The division operation is converted into a bit operation (without overflow)a / (2^n) is equivalent to a>> n
Example: 12/8 == 12>>3
##(14) a % 2 is equivalent to a & 1(15) if (x == a) x= b;
else x= a;
Equivalent to x= a ^ b ^ x; (16) The opposite number of x is expressed as (~x+1)Do not shift right by more than 32 bits on 32-bit systems, and do not shift left when the result may exceed 32 bits
The above is the detailed content of The purpose of php bit operators. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



PHP 8.4 brings several new features, security improvements, and performance improvements with healthy amounts of feature deprecations and removals. This guide explains how to install PHP 8.4 or upgrade to PHP 8.4 on Ubuntu, Debian, or their derivati

Visual Studio Code, also known as VS Code, is a free source code editor — or integrated development environment (IDE) — available for all major operating systems. With a large collection of extensions for many programming languages, VS Code can be c

If you are an experienced PHP developer, you might have the feeling that you’ve been there and done that already.You have developed a significant number of applications, debugged millions of lines of code, and tweaked a bunch of scripts to achieve op

This tutorial demonstrates how to efficiently process XML documents using PHP. XML (eXtensible Markup Language) is a versatile text-based markup language designed for both human readability and machine parsing. It's commonly used for data storage an

JWT is an open standard based on JSON, used to securely transmit information between parties, mainly for identity authentication and information exchange. 1. JWT consists of three parts: Header, Payload and Signature. 2. The working principle of JWT includes three steps: generating JWT, verifying JWT and parsing Payload. 3. When using JWT for authentication in PHP, JWT can be generated and verified, and user role and permission information can be included in advanced usage. 4. Common errors include signature verification failure, token expiration, and payload oversized. Debugging skills include using debugging tools and logging. 5. Performance optimization and best practices include using appropriate signature algorithms, setting validity periods reasonably,

A string is a sequence of characters, including letters, numbers, and symbols. This tutorial will learn how to calculate the number of vowels in a given string in PHP using different methods. The vowels in English are a, e, i, o, u, and they can be uppercase or lowercase. What is a vowel? Vowels are alphabetic characters that represent a specific pronunciation. There are five vowels in English, including uppercase and lowercase: a, e, i, o, u Example 1 Input: String = "Tutorialspoint" Output: 6 explain The vowels in the string "Tutorialspoint" are u, o, i, a, o, i. There are 6 yuan in total

Static binding (static::) implements late static binding (LSB) in PHP, allowing calling classes to be referenced in static contexts rather than defining classes. 1) The parsing process is performed at runtime, 2) Look up the call class in the inheritance relationship, 3) It may bring performance overhead.

What are the magic methods of PHP? PHP's magic methods include: 1.\_\_construct, used to initialize objects; 2.\_\_destruct, used to clean up resources; 3.\_\_call, handle non-existent method calls; 4.\_\_get, implement dynamic attribute access; 5.\_\_set, implement dynamic attribute settings. These methods are automatically called in certain situations, improving code flexibility and efficiency.
