Finding entry points Branch analysis from position: 0 2 jumps found. (Code = 43) Position 1 = 1, Position 2 = 8 Branch analysis from position: 1 2 jumps found. (Code = 43) Position 1 = 9, Position 2 = 16 Branch analysis from position: 9 2 jumps found. (Code = 43) Position 1 = 17, Position 2 = 24 Branch analysis from position: 17 2 jumps found. (Code = 43) Position 1 = 25, Position 2 = 32 Branch analysis from position: 25 2 jumps found. (Code = 43) Position 1 = 33, Position 2 = 40 Branch analysis from position: 33 2 jumps found. (Code = 43) Position 1 = 41, Position 2 = 48 Branch analysis from position: 41 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 48 Branch analysis from position: 40 Branch analysis from position: 32 Branch analysis from position: 24 Branch analysis from position: 16 Branch analysis from position: 8 filename: /in/DTcbU function name: (null) number of ops: 49 compiled vars: none line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 2 0 E > > JMPZ <true>, ->8 3 1 > INIT_FCALL 'crypt' 2 SEND_VAL 'rasmuslerdorf' 3 SEND_VAL 'rl' 4 DO_ICALL $0 5 CONCAT ~1 'Standard+DES%3A+', $0 6 CONCAT ~2 ~1, '%0A' 7 ECHO ~2 6 8 > > JMPZ <true>, ->16 7 9 > INIT_FCALL 'crypt' 10 SEND_VAL 'rasmuslerdorf' 11 SEND_VAL '_J9..rasm' 12 DO_ICALL $3 13 CONCAT ~4 'Extended+DES%3A+', $3 14 CONCAT ~5 ~4, '%0A' 15 ECHO ~5 10 16 > > JMPZ <true>, ->24 11 17 > INIT_FCALL 'crypt' 18 SEND_VAL 'rasmuslerdorf' 19 SEND_VAL '%241%24rasmusle%24' 20 DO_ICALL $6 21 CONCAT ~7 'MD5%3A++++++++++', $6 22 CONCAT ~8 ~7, '%0A' 23 ECHO ~8 14 24 > > JMPZ <true>, ->32 15 25 > INIT_FCALL 'crypt' 26 SEND_VAL 'rasmuslerdorf' 27 SEND_VAL '%242a%2407%24usesomesillystringforsalt%24' 28 DO_ICALL $9 29 CONCAT ~10 'Blowfish%3A+++++', $9 30 CONCAT ~11 ~10, '%0A' 31 ECHO ~11 18 32 > > JMPZ <true>, ->40 19 33 > INIT_FCALL 'crypt' 34 SEND_VAL 'rasmuslerdorf' 35 SEND_VAL '%245%24rounds%3D5000%24usesomesillystringforsalt%24' 36 DO_ICALL $12 37 CONCAT ~13 'SHA-256%3A++++++', $12 38 CONCAT ~14 ~13, '%0A' 39 ECHO ~14 22 40 > > JMPZ <true>, ->48 23 41 > INIT_FCALL 'crypt' 42 SEND_VAL 'rasmuslerdorf' 43 SEND_VAL '%246%24rounds%3D5000%24usesomesillystringforsalt%24' 44 DO_ICALL $15 45 CONCAT ~16 'SHA-512%3A++++++', $15 46 CONCAT ~17 ~16, '%0A' 47 ECHO ~17 24 48 > > RETURN 1
Generated using Vulcan Logic Dumper, using php 8.0.0