Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename: /in/DkmmI
function name: (null)
number of ops: 53
compiled vars: !0 = $my_secret, !1 = $my_public, !2 = $scott_secret, !3 = $scott_public, !4 = $my_shared_with_scott, !5 = $scott_shared_with_me
line #* E I O op fetch ext return operands
-------------------------------------------------------------------------------------
3 0 E > INIT_FCALL_BY_NAME 'sodium_hex2bin'
1 SEND_VAL_EX 'da93b1db433cfb2efe490a1bb263e440b586b6167c20b86f14cd058515806940'
2 DO_FCALL 0 $6
3 ASSIGN !0, $6
4 4 INIT_FCALL_BY_NAME 'sodium_crypto_scalarmult_base'
5 SEND_VAR_EX !0
6 DO_FCALL 0 $8
7 ASSIGN !1, $8
6 8 INIT_FCALL 'random_bytes'
9 SEND_VAL 32
10 DO_ICALL $10
11 ASSIGN !2, $10
7 12 INIT_FCALL_BY_NAME 'sodium_crypto_scalarmult_base'
13 SEND_VAR_EX !2
14 DO_FCALL 0 $12
15 ASSIGN !3, $12
9 16 INIT_FCALL_BY_NAME 'sodium_crypto_scalarmult'
17 SEND_VAR_EX !0
18 SEND_VAR_EX !3
19 DO_FCALL 0 $14
20 ASSIGN !4, $14
10 21 INIT_FCALL_BY_NAME 'sodium_crypto_scalarmult'
22 SEND_VAR_EX !2
23 SEND_VAR_EX !1
24 DO_FCALL 0 $16
25 ASSIGN !5, $16
12 26 ECHO 'An+attacker+can+only+see%3A+'
27 ECHO '%0A'
13 28 INIT_FCALL 'var_dump'
15 29 INIT_FCALL_BY_NAME 'sodium_bin2hex'
30 SEND_VAR_EX !1
31 DO_FCALL 0 $18
32 INIT_ARRAY ~19 $18, 'my+public'
17 33 INIT_FCALL_BY_NAME 'sodium_bin2hex'
34 SEND_VAR_EX !3
35 DO_FCALL 0 $20
36 ADD_ARRAY_ELEMENT ~19 $20, 'scott+public'
37 SEND_VAL ~19
13 38 DO_ICALL
20 39 ECHO 'Together%2C+we+calculated+a+shared+secret+for+encryption%3A+'
40 ECHO '%0A'
21 41 INIT_FCALL 'var_dump'
23 42 INIT_FCALL_BY_NAME 'sodium_bin2hex'
43 SEND_VAR_EX !4
44 DO_FCALL 0 $22
45 INIT_ARRAY ~23 $22, 'I+see'
25 46 INIT_FCALL_BY_NAME 'sodium_bin2hex'
47 SEND_VAR_EX !5
48 DO_FCALL 0 $24
49 ADD_ARRAY_ELEMENT ~23 $24, 'Scott+sees'
50 SEND_VAL ~23
21 51 DO_ICALL
26 52 > RETURN 1
Generated using Vulcan Logic Dumper, using php 8.0.0