3v4l.org

run code in 300+ PHP versions simultaneously
<?php $clefSecrete = "glop"; $str = '5c7Zms7hW3y4e4gOCOjzfg=='; $bla = openssl_decrypt($str, 'AES-192-CFB1', $clefSecrete); print "SSH Credentials:<br>username: root:<br>password: <b>$bla</b>"; ?>
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/Ct4cu
function name:  (null)
number of ops:  13
compiled vars:  !0 = $clefSecrete, !1 = $str, !2 = $bla
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    2     0  E >   ASSIGN                                                   !0, 'glop'
    3     1        ASSIGN                                                   !1, '5c7Zms7hW3y4e4gOCOjzfg%3D%3D'
    4     2        INIT_FCALL_BY_NAME                                       'openssl_decrypt'
          3        SEND_VAR_EX                                              !1
          4        SEND_VAL_EX                                              'AES-192-CFB1'
          5        SEND_VAR_EX                                              !0
          6        DO_FCALL                                      0  $5      
          7        ASSIGN                                                   !2, $5
    5     8        ROPE_INIT                                     3  ~8      'SSH+Credentials%3A%3Cbr%3Eusername%3A+root%3A%3Cbr%3Epassword%3A+%3Cb%3E'
          9        ROPE_ADD                                      1  ~8      ~8, !2
         10        ROPE_END                                      2  ~7      ~8, '%3C%2Fb%3E'
         11        ECHO                                                     ~7
    6    12      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
145.75 ms | 1393 KiB | 13 Q