Finding entry points Branch analysis from position: 0 1 jumps found. (Code = 62) Position 1 = -2 filename: /in/4pV1N function name: (null) number of ops: 25 compiled vars: none line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 88 0 E > INIT_STATIC_METHOD_CALL 'Php72', 'spl_object_id' 1 NEW $0 'StdClass' 2 DO_FCALL 0 3 SEND_VAR $0 4 DO_FCALL 0 $2 5 ECHO $2 89 6 INIT_STATIC_METHOD_CALL 'Php72', 'spl_object_id' 7 NEW $3 'StdClass' 8 DO_FCALL 0 9 SEND_VAR $3 10 DO_FCALL 0 $5 11 ECHO $5 90 12 INIT_STATIC_METHOD_CALL 'Php72', 'spl_object_id' 13 NEW $6 'StdClass' 14 DO_FCALL 0 15 SEND_VAR $6 16 DO_FCALL 0 $8 17 ECHO $8 91 18 INIT_STATIC_METHOD_CALL 'Php72', 'spl_object_id' 19 NEW $9 'StdClass' 20 DO_FCALL 0 21 SEND_VAR $9 22 DO_FCALL 0 $11 23 ECHO $11 24 > RETURN 1 Class Php72: Function utf8_encode: Finding entry points Branch analysis from position: 0 1 jumps found. (Code = 42) Position 1 = 42 Branch analysis from position: 42 2 jumps found. (Code = 44) Position 1 = 44, Position 2 = 8 Branch analysis from position: 44 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 8 2 jumps found. (Code = 44) Position 1 = 11, Position 2 = 15 Branch analysis from position: 11 2 jumps found. (Code = 44) Position 1 = 14, Position 2 = 19 Branch analysis from position: 14 1 jumps found. (Code = 42) Position 1 = 26 Branch analysis from position: 26 1 jumps found. (Code = 42) Position 1 = 40 Branch analysis from position: 40 2 jumps found. (Code = 44) Position 1 = 44, Position 2 = 8 Branch analysis from position: 44 Branch analysis from position: 8 Branch analysis from position: 19 1 jumps found. (Code = 42) Position 1 = 40 Branch analysis from position: 40 Branch analysis from position: 15 1 jumps found. (Code = 42) Position 1 = 40 Branch analysis from position: 40 filename: /in/4pV1N function name: utf8_encode number of ops: 51 compiled vars: !0 = $s, !1 = $len, !2 = $i, !3 = $j line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 7 0 E > RECV !0 9 1 ASSIGN_OP 8 !0, !0 10 2 STRLEN ~5 !0 3 ASSIGN !1, ~5 11 4 SR ~7 !1, 1 5 ASSIGN !2, ~7 6 ASSIGN !3, 0 7 > JMP ->42 13 8 > FETCH_DIM_R ~11 !0, !2 9 IS_SMALLER ~11, '%80' 10 > JMPNZ ~12, ->15 14 11 > FETCH_DIM_R ~13 !0, !2 12 IS_SMALLER ~13, '%C0' 13 > JMPNZ ~14, ->19 14 > > JMP ->26 13 15 > FETCH_DIM_R ~16 !0, !2 16 ASSIGN_DIM !0, !3 17 OP_DATA ~16 18 > JMP ->40 14 19 > ASSIGN_DIM !0, !3 20 OP_DATA '%C2' 21 PRE_INC ~18 !3 22 FETCH_DIM_R ~20 !0, !2 23 ASSIGN_DIM !0, ~18 24 OP_DATA ~20 25 > JMP ->40 15 26 > ASSIGN_DIM !0, !3 27 OP_DATA '%C3' 28 PRE_INC ~22 !3 29 INIT_FCALL 'chr' 30 INIT_FCALL 'ord' 31 FETCH_DIM_R ~24 !0, !2 32 SEND_VAL ~24 33 DO_ICALL $25 34 SUB ~26 $25, 64 35 SEND_VAL ~26 36 DO_ICALL $27 37 ASSIGN_DIM !0, ~22 38 OP_DATA $27 39 > JMP ->40 11 40 > PRE_INC !2 41 PRE_INC !3 42 > IS_SMALLER !2, !1 43 > JMPNZ ~30, ->8 18 44 > INIT_FCALL 'substr' 45 SEND_VAR !0 46 SEND_VAL 0 47 SEND_VAR !3 48 DO_ICALL $31 49 > RETURN $31 19 50* > RETURN null End of function utf8_encode Function utf8_decode: Finding entry points Branch analysis from position: 0 1 jumps found. (Code = 42) Position 1 = 55 Branch analysis from position: 55 2 jumps found. (Code = 44) Position 1 = 57, Position 2 = 7 Branch analysis from position: 57 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 7 6 jumps found. (Code = 188) Position 1 = 19, Position 2 = 19, Position 3 = 44, Position 4 = 45, Position 5 = 49, Position 6 = 10 Branch analysis from position: 19 2 jumps found. (Code = 43) Position 1 = 35, Position 2 = 40 Branch analysis from position: 35 1 jumps found. (Code = 42) Position 1 = 41 Branch analysis from position: 41 1 jumps found. (Code = 42) Position 1 = 52 Branch analysis from position: 52 2 jumps found. (Code = 44) Position 1 = 57, Position 2 = 7 Branch analysis from position: 57 Branch analysis from position: 7 Branch analysis from position: 40 1 jumps found. (Code = 42) Position 1 = 52 Branch analysis from position: 52 Branch analysis from position: 19 Branch analysis from position: 44 1 jumps found. (Code = 42) Position 1 = 52 Branch analysis from position: 52 Branch analysis from position: 45 Branch analysis from position: 49 2 jumps found. (Code = 44) Position 1 = 57, Position 2 = 7 Branch analysis from position: 57 Branch analysis from position: 7 Branch analysis from position: 10 2 jumps found. (Code = 44) Position 1 = 12, Position 2 = 19 Branch analysis from position: 12 2 jumps found. (Code = 44) Position 1 = 14, Position 2 = 19 Branch analysis from position: 14 2 jumps found. (Code = 44) Position 1 = 16, Position 2 = 44 Branch analysis from position: 16 2 jumps found. (Code = 44) Position 1 = 18, Position 2 = 45 Branch analysis from position: 18 1 jumps found. (Code = 42) Position 1 = 49 Branch analysis from position: 49 Branch analysis from position: 45 Branch analysis from position: 44 Branch analysis from position: 19 Branch analysis from position: 19 filename: /in/4pV1N function name: utf8_decode number of ops: 64 compiled vars: !0 = $s, !1 = $len, !2 = $i, !3 = $j, !4 = $c line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 20 0 E > RECV !0 22 1 ASSIGN_OP 8 !0, '' 23 2 STRLEN ~6 !0 3 ASSIGN !1, ~6 24 4 ASSIGN !2, 0 5 ASSIGN !3, 0 6 > JMP ->55 25 7 > FETCH_DIM_R ~10 !0, !2 8 BW_AND ~11 ~10, '%F0' 9 > SWITCH_STRING ~11, [ '%C0':->19, '%D0':->19, '%F0':->44, '%E0':->45, ], ->49 26 10 > CASE ~11, '%C0' 11 > JMPNZ ~12, ->19 27 12 > CASE ~11, '%D0' 13 > JMPNZ ~12, ->19 31 14 > CASE ~11, '%F0' 15 > JMPNZ ~12, ->44 32 16 > CASE ~11, '%E0' 17 > JMPNZ ~12, ->45 18 > > JMP ->49 28 19 > INIT_FCALL 'ord' 20 FETCH_DIM_R ~13 !0, !2 21 BW_AND ~14 ~13, '%1F' 22 SEND_VAL ~14 23 DO_ICALL $15 24 SL ~16 $15, 6 25 INIT_FCALL 'ord' 26 PRE_INC ~17 !2 27 FETCH_DIM_R ~18 !0, ~17 28 BW_AND ~19 ~18, '%3F' 29 SEND_VAL ~19 30 DO_ICALL $20 31 BW_OR ~21 $20, ~16 32 ASSIGN !4, ~21 29 33 IS_SMALLER !4, 256 34 > JMPZ ~24, ->40 35 > INIT_FCALL 'chr' 36 SEND_VAR !4 37 DO_ICALL $25 38 QM_ASSIGN ~26 $25 39 > JMP ->41 40 > QM_ASSIGN ~26 '%3F' 41 > ASSIGN_DIM !0, !3 42 OP_DATA ~26 30 43 > JMP ->52 31 44 > PRE_INC !2 33 45 > ASSIGN_DIM !0, !3 46 OP_DATA '%3F' 34 47 ASSIGN_OP 1 !2, 2 35 48 > JMP ->52 37 49 > FETCH_DIM_R ~31 !0, !2 50 ASSIGN_DIM !0, !3 51 OP_DATA ~31 52 > FREE ~11 24 53 PRE_INC !2 54 PRE_INC !3 55 > IS_SMALLER !2, !1 56 > JMPNZ ~34, ->7 40 57 > INIT_FCALL 'substr' 58 SEND_VAR !0 59 SEND_VAL 0 60 SEND_VAR !3 61 DO_ICALL $35 62 > RETURN $35 41 63* > RETURN null End of function utf8_decode Function php_os_family: Finding entry points Branch analysis from position: 0 2 jumps found. (Code = 43) Position 1 = 1, Position 2 = 2 Branch analysis from position: 1 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 2 2 jumps found. (Code = 43) Position 1 = 5, Position 2 = 8 Branch analysis from position: 5 1 jumps found. (Code = 42) Position 1 = 9 Branch analysis from position: 9 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 8 1 jumps found. (Code = 62) Position 1 = -2 filename: /in/4pV1N function name: php_os_family number of ops: 11 compiled vars: !0 = $map line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 44 0 E > > JMPZ <false>, ->2 45 1 > > RETURN 'Windows' 47 2 > ASSIGN !0, <array> 56 3 ISSET_ISEMPTY_DIM_OBJ 0 !0, 'Linux' 4 > JMPZ ~2, ->8 5 > FETCH_DIM_R ~3 !0, 'Linux' 6 QM_ASSIGN ~4 ~3 7 > JMP ->9 8 > QM_ASSIGN ~4 'Unknown' 9 > > RETURN ~4 57 10* > RETURN null End of function php_os_family Function spl_object_id: Finding entry points Branch analysis from position: 0 2 jumps found. (Code = 43) Position 1 = 4, Position 2 = 6 Branch analysis from position: 4 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 6 filename: /in/4pV1N function name: spl_object_id number of ops: 22 compiled vars: !0 = $object line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 58 0 E > RECV !0 60 1 FETCH_STATIC_PROP_R unknown ~1 'hashMask' 2 TYPE_CHECK 2 ~1 3 > JMPZ ~2, ->6 61 4 > INIT_STATIC_METHOD_CALL 'initHashMask' 5 DO_FCALL 0 63 6 > FETCH_STATIC_PROP_R unknown ~4 'hashMask' 7 INIT_FCALL 'hexdec' 8 INIT_FCALL 'substr' 9 INIT_FCALL 'spl_object_hash' 10 SEND_VAR !0 11 DO_ICALL $5 12 SEND_VAR $5 13 FETCH_STATIC_PROP_R unknown ~6 'hashOffset' 14 SEND_VAL ~6 15 SEND_VAL 8 16 DO_ICALL $7 17 SEND_VAR $7 18 DO_ICALL $8 19 BW_XOR ~9 $8, ~4 20 > RETURN ~9 64 21* > RETURN null End of function spl_object_id Function inithashmask: Finding entry points Branch analysis from position: 0 2 jumps found. (Code = 43) Position 1 = 9, Position 2 = 11 Branch analysis from position: 9 1 jumps found. (Code = 42) Position 1 = 12 Branch analysis from position: 12 2 jumps found. (Code = 77) Position 1 = 15, Position 2 = 39 Branch analysis from position: 15 2 jumps found. (Code = 78) Position 1 = 16, Position 2 = 39 Branch analysis from position: 16 2 jumps found. (Code = 46) Position 1 = 19, Position 2 = 22 Branch analysis from position: 19 2 jumps found. (Code = 46) Position 1 = 23, Position 2 = 27 Branch analysis from position: 23 2 jumps found. (Code = 46) Position 1 = 28, Position 2 = 34 Branch analysis from position: 28 2 jumps found. (Code = 43) Position 1 = 35, Position 2 = 38 Branch analysis from position: 35 1 jumps found. (Code = 42) Position 1 = 39 Branch analysis from position: 39 2 jumps found. (Code = 43) Position 1 = 43, Position 2 = 57 Branch analysis from position: 43 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 57 Branch analysis from position: 38 1 jumps found. (Code = 42) Position 1 = 15 Branch analysis from position: 15 Branch analysis from position: 34 Branch analysis from position: 27 Branch analysis from position: 22 Branch analysis from position: 39 Branch analysis from position: 39 Branch analysis from position: 11 2 jumps found. (Code = 77) Position 1 = 15, Position 2 = 39 Branch analysis from position: 15 Branch analysis from position: 39 filename: /in/4pV1N function name: initHashMask number of ops: 72 compiled vars: !0 = $obj, !1 = $obFuncs, !2 = $frame line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 67 0 E > CAST 8 ~3 <array> 1 ASSIGN !0, ~3 68 2 ASSIGN_STATIC_PROP 'hashOffset' 3 OP_DATA 8 69 4 ASSIGN_STATIC_PROP 'hashMask' 5 OP_DATA -1 71 6 ASSIGN !1, <array> 72 7 INIT_FCALL 'debug_backtrace' 8 > JMPZ <true>, ->11 9 > QM_ASSIGN ~8 2 10 > JMP ->12 11 > QM_ASSIGN ~8 <false> 12 > SEND_VAL ~8 13 DO_ICALL $9 14 > FE_RESET_R $10 $9, ->39 15 > > FE_FETCH_R $10, !2, ->39 73 16 > FETCH_DIM_IS ~11 !2, 'function' 17 ISSET_ISEMPTY_DIM_OBJ 0 ~12 ~11, 0 18 > JMPZ_EX ~12 ~12, ->22 19 > ISSET_ISEMPTY_DIM_OBJ 0 ~13 !2, 'class' 20 BOOL_NOT ~14 ~13 21 BOOL ~12 ~14 22 > > JMPZ_EX ~12 ~12, ->27 23 > FETCH_DIM_R ~15 !2, 'function' 24 FETCH_DIM_R ~16 ~15, 0 25 IS_IDENTICAL ~17 ~16, 'o' 26 BOOL ~12 ~17 27 > > JMPZ_EX ~12 ~12, ->34 28 > INIT_FCALL 'in_array' 29 FETCH_DIM_R ~18 !2, 'function' 30 SEND_VAL ~18 31 SEND_VAR !1 32 DO_ICALL $19 33 BOOL ~12 $19 34 > > JMPZ ~12, ->38 74 35 > ASSIGN_DIM !2, 'line' 36 OP_DATA 0 75 37 > JMP ->39 72 38 > > JMP ->15 39 > FE_FREE $10 78 40 ISSET_ISEMPTY_DIM_OBJ 1 ~21 !2, 'line' 41 BOOL_NOT ~22 ~21 42 > JMPZ ~22, ->57 79 43 > INIT_FCALL 'ob_start' 44 DO_ICALL 80 45 INIT_FCALL 'debug_zval_dump' 46 SEND_VAR !0 47 DO_ICALL 81 48 INIT_FCALL 'substr' 49 INIT_FCALL 'ob_get_clean' 50 DO_ICALL $26 51 SEND_VAR $26 52 SEND_VAL 17 53 DO_ICALL $27 54 CAST 4 ~28 $27 55 ASSIGN_STATIC_PROP 'hashMask' 56 OP_DATA ~28 83 57 > INIT_FCALL 'hexdec' 58 INIT_FCALL 'substr' 59 INIT_FCALL 'spl_object_hash' 60 SEND_VAR !0 61 DO_ICALL $30 62 SEND_VAR $30 63 FETCH_STATIC_PROP_R unknown ~31 'hashOffset' 64 SEND_VAL ~31 65 SEND_VAL 8 66 DO_ICALL $32 67 SEND_VAR $32 68 DO_ICALL $33 69 ASSIGN_STATIC_PROP_OP 11 'hashMask' 70 OP_DATA $33 84 71 > RETURN null End of function inithashmask End of class Php72.
Generated using Vulcan Logic Dumper, using php 8.0.0