Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 43) Position 1 = 1, Position 2 = 8
Branch analysis from position: 1
2 jumps found. (Code = 43) Position 1 = 9, Position 2 = 16
Branch analysis from position: 9
2 jumps found. (Code = 43) Position 1 = 17, Position 2 = 24
Branch analysis from position: 17
2 jumps found. (Code = 43) Position 1 = 25, Position 2 = 32
Branch analysis from position: 25
2 jumps found. (Code = 43) Position 1 = 33, Position 2 = 40
Branch analysis from position: 33
2 jumps found. (Code = 43) Position 1 = 41, Position 2 = 48
Branch analysis from position: 41
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 48
Branch analysis from position: 40
Branch analysis from position: 32
Branch analysis from position: 24
Branch analysis from position: 16
Branch analysis from position: 8
filename: /in/DTcbU
function name: (null)
number of ops: 49
compiled vars: none
line #* E I O op fetch ext return operands
-------------------------------------------------------------------------------------
2 0 E > > JMPZ <true>, ->8
3 1 > INIT_FCALL 'crypt'
2 SEND_VAL 'rasmuslerdorf'
3 SEND_VAL 'rl'
4 DO_ICALL $0
5 CONCAT ~1 'Standard+DES%3A+', $0
6 CONCAT ~2 ~1, '%0A'
7 ECHO ~2
6 8 > > JMPZ <true>, ->16
7 9 > INIT_FCALL 'crypt'
10 SEND_VAL 'rasmuslerdorf'
11 SEND_VAL '_J9..rasm'
12 DO_ICALL $3
13 CONCAT ~4 'Extended+DES%3A+', $3
14 CONCAT ~5 ~4, '%0A'
15 ECHO ~5
10 16 > > JMPZ <true>, ->24
11 17 > INIT_FCALL 'crypt'
18 SEND_VAL 'rasmuslerdorf'
19 SEND_VAL '%241%24rasmusle%24'
20 DO_ICALL $6
21 CONCAT ~7 'MD5%3A++++++++++', $6
22 CONCAT ~8 ~7, '%0A'
23 ECHO ~8
14 24 > > JMPZ <true>, ->32
15 25 > INIT_FCALL 'crypt'
26 SEND_VAL 'rasmuslerdorf'
27 SEND_VAL '%242a%2407%24usesomesillystringforsalt%24'
28 DO_ICALL $9
29 CONCAT ~10 'Blowfish%3A+++++', $9
30 CONCAT ~11 ~10, '%0A'
31 ECHO ~11
18 32 > > JMPZ <true>, ->40
19 33 > INIT_FCALL 'crypt'
34 SEND_VAL 'rasmuslerdorf'
35 SEND_VAL '%245%24rounds%3D5000%24usesomesillystringforsalt%24'
36 DO_ICALL $12
37 CONCAT ~13 'SHA-256%3A++++++', $12
38 CONCAT ~14 ~13, '%0A'
39 ECHO ~14
22 40 > > JMPZ <true>, ->48
23 41 > INIT_FCALL 'crypt'
42 SEND_VAL 'rasmuslerdorf'
43 SEND_VAL '%246%24rounds%3D5000%24usesomesillystringforsalt%24'
44 DO_ICALL $15
45 CONCAT ~16 'SHA-512%3A++++++', $15
46 CONCAT ~17 ~16, '%0A'
47 ECHO ~17
24 48 > > RETURN 1
Generated using Vulcan Logic Dumper, using php 8.0.0