Finding entry points Branch analysis from position: 0 2 jumps found. (Code = 43) Position 1 = 1, Position 2 = 8 Branch analysis from position: 1 2 jumps found. (Code = 43) Position 1 = 9, Position 2 = 16 Branch analysis from position: 9 2 jumps found. (Code = 43) Position 1 = 17, Position 2 = 24 Branch analysis from position: 17 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 24 Branch analysis from position: 16 Branch analysis from position: 8 filename: /in/AGM16 function name: (null) number of ops: 60 compiled vars: none line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 2 0 E > > JMPZ <true>, ->8 4 1 > INIT_FCALL 'crypt' 2 SEND_VAL 'ohgakiyasuo' 3 SEND_VAL '%242y%2412%24usesomesillystringforsalt%24' 4 DO_ICALL $0 5 CONCAT ~1 'Blowfish%3A+++++', $0 6 CONCAT ~2 ~1, '%0A' 7 ECHO ~2 6 8 > > JMPZ <true>, ->16 8 9 > INIT_FCALL 'crypt' 10 SEND_VAL 'ohgakiyasuo' 11 SEND_VAL '%245%24rounds%3D9000%24usesomesillystringforsalt%24' 12 DO_ICALL $3 13 CONCAT ~4 'SHA-256%3A++++++', $3 14 CONCAT ~5 ~4, '%0A' 15 ECHO ~5 10 16 > > JMPZ <true>, ->24 12 17 > INIT_FCALL 'crypt' 18 SEND_VAL 'ohgakiyasuo' 19 SEND_VAL '%246%24rounds%3D9000%24usesomesillystringforsalt%24' 20 DO_ICALL $6 21 CONCAT ~7 'SHA-512%3A++++++', $6 22 CONCAT ~8 ~7, '%0A' 23 ECHO ~8 16 24 > INIT_FCALL 'crypt' 25 SEND_VAL 'ohgakiyasuo' 26 SEND_VAL '%242a%2407%24%21%22%23%24%25%26%27%28%290%3D%7E%21%22%23%24%25%26%27%28%290%21%22%24' 27 DO_ICALL $9 28 CONCAT ~10 'Blowfish%3A+++++', $9 29 CONCAT ~11 ~10, '%0A' 30 ECHO ~11 17 31 INIT_FCALL 'crypt' 32 SEND_VAL 'ohgakiyasuo' 33 SEND_VAL '%242a%2407%24' 34 DO_ICALL $12 35 CONCAT ~13 'Blowfish%3A+++++', $12 36 CONCAT ~14 ~13, '%0A' 37 ECHO ~14 20 38 INIT_FCALL 'crypt' 39 SEND_VAL 'ohgakiyasuo' 40 SEND_VAL '%246%24round%3D9000%24usesomesillystringforsalt%24' 41 DO_ICALL $15 42 CONCAT ~16 'SHA-512%3A++++++', $15 43 CONCAT ~17 ~16, '%0A' 44 ECHO ~17 23 45 INIT_FCALL 'crypt' 46 SEND_VAL 'ohgakiyasuo' 47 SEND_VAL '%246%24rounds%3D9000%24usesome%24sillystringforsalt%24' 48 DO_ICALL $18 49 CONCAT ~19 'SHA-512%3A++++++', $18 50 CONCAT ~20 ~19, '%0A' 51 ECHO ~20 25 52 INIT_FCALL 'crypt' 53 SEND_VAL 'ohgakiyasuo' 54 SEND_VAL '%246%24' 55 DO_ICALL $21 56 CONCAT ~22 'SHA-512%3A++++++', $21 57 CONCAT ~23 ~22, '%0A' 58 ECHO ~23 59 > RETURN 1
Generated using Vulcan Logic Dumper, using php 8.0.0