3v4l.org

run code in 300+ PHP versions simultaneously
<?php $string = '0aJCRTYeg0FkVoh8UvfLs6EfT_PuV8RD2T5tai9h3heVtH8NujCdjy1Kj8ehZoio3PBzdQ1Py2k'; $iv_size = mcrypt_get_iv_size(MCRYPT_BLOWFISH, MCRYPT_MODE_ECB); $initVector = mcrypt_create_iv($iv_size, MCRYPT_RAND); $cryptText = mcrypt_encrypt(MCRYPT_BLOWFISH, 'h4selk0ZgadniJt0SUCKER12344$$#', gzcompress($string), MCRYPT_MODE_ECB, $initVector); $cryptText = urlsafe_base64_encode($cryptText); echo $cryptText;
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/FlSla
function name:  (null)
number of ops:  33
compiled vars:  !0 = $string, !1 = $iv_size, !2 = $initVector, !3 = $cryptText
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    3     0  E >   ASSIGN                                                   !0, '0aJCRTYeg0FkVoh8UvfLs6EfT_PuV8RD2T5tai9h3heVtH8NujCdjy1Kj8ehZoio3PBzdQ1Py2k'
    5     1        INIT_FCALL_BY_NAME                                       'mcrypt_get_iv_size'
          2        FETCH_CONSTANT                                   ~5      'MCRYPT_BLOWFISH'
          3        SEND_VAL_EX                                              ~5
          4        FETCH_CONSTANT                                   ~6      'MCRYPT_MODE_ECB'
          5        SEND_VAL_EX                                              ~6
          6        DO_FCALL                                      0  $7      
          7        ASSIGN                                                   !1, $7
    6     8        INIT_FCALL_BY_NAME                                       'mcrypt_create_iv'
          9        SEND_VAR_EX                                              !1
         10        FETCH_CONSTANT                                   ~9      'MCRYPT_RAND'
         11        SEND_VAL_EX                                              ~9
         12        DO_FCALL                                      0  $10     
         13        ASSIGN                                                   !2, $10
    7    14        INIT_FCALL_BY_NAME                                       'mcrypt_encrypt'
         15        FETCH_CONSTANT                                   ~12     'MCRYPT_BLOWFISH'
         16        SEND_VAL_EX                                              ~12
         17        SEND_VAL_EX                                              'h4selk0ZgadniJt0SUCKER12344%24%24%23'
         18        INIT_FCALL                                               'gzcompress'
         19        SEND_VAR                                                 !0
         20        DO_ICALL                                         $13     
         21        SEND_VAR_NO_REF_EX                                       $13
         22        FETCH_CONSTANT                                   ~14     'MCRYPT_MODE_ECB'
         23        SEND_VAL_EX                                              ~14
         24        SEND_VAR_EX                                              !2
         25        DO_FCALL                                      0  $15     
         26        ASSIGN                                                   !3, $15
    8    27        INIT_FCALL_BY_NAME                                       'urlsafe_base64_encode'
         28        SEND_VAR_EX                                              !3
         29        DO_FCALL                                      0  $17     
         30        ASSIGN                                                   !3, $17
   10    31        ECHO                                                     !3
         32      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
161.11 ms | 942 KiB | 16 Q