Finding entry points Branch analysis from position: 0 2 jumps found. (Code = 43) Position 1 = 1, Position 2 = 63 Branch analysis from position: 1 2 jumps found. (Code = 43) Position 1 = 23, Position 2 = 30 Branch analysis from position: 23 1 jumps found. (Code = 42) Position 1 = 36 Branch analysis from position: 36 2 jumps found. (Code = 43) Position 1 = 38, Position 2 = 45 Branch analysis from position: 38 1 jumps found. (Code = 42) Position 1 = 48 Branch analysis from position: 48 2 jumps found. (Code = 46) Position 1 = 50, Position 2 = 53 Branch analysis from position: 50 2 jumps found. (Code = 43) Position 1 = 54, Position 2 = 58 Branch analysis from position: 54 1 jumps found. (Code = 42) Position 1 = 61 Branch analysis from position: 61 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 58 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 53 Branch analysis from position: 45 2 jumps found. (Code = 46) Position 1 = 50, Position 2 = 53 Branch analysis from position: 50 Branch analysis from position: 53 Branch analysis from position: 30 2 jumps found. (Code = 43) Position 1 = 38, Position 2 = 45 Branch analysis from position: 38 Branch analysis from position: 45 Branch analysis from position: 63 1 jumps found. (Code = 62) Position 1 = -2 filename: /in/H72jQ function name: (null) number of ops: 64 compiled vars: !0 = $adminloggedIn, !1 = $config, !2 = $adminOptions, !3 = $successImg, !4 = $failImg, !5 = $app, !6 = $output line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 3 0 E > > JMPZ !0, ->63 4 1 > BIND_GLOBAL !1, 'config' 2 BIND_GLOBAL !2, 'adminOptions' 3 BIND_GLOBAL !3, 'successImg' 4 BIND_GLOBAL !4, 'failImg' 5 5 INIT_FCALL 'json_decode' 6 INIT_FCALL 'file_get_contents' 7 FETCH_DIM_R ~7 !1, 'appId' 8 CONCAT ~8 'https%3A%2F%2Fgraph.facebook.com%2F', ~7 9 CONCAT ~9 ~8, '%3Faccess_token%3D' 10 FETCH_DIM_R ~10 !1, 'appId' 11 CONCAT ~11 ~9, ~10 12 CONCAT ~12 ~11, '%7C' 13 FETCH_DIM_R ~13 !1, 'secret' 14 CONCAT ~14 ~12, ~13 15 SEND_VAL ~14 16 DO_ICALL $15 17 SEND_VAR $15 18 DO_ICALL $16 19 ASSIGN !5, $16 6 20 ASSIGN !6, '%3Cdiv+id%3D%27admindiv%27%3E%3Ch3%3ESettings+Information%3A%3C%2Fh3%3E' 7 21 ISSET_ISEMPTY_PROP_OBJ !5, 'id' 22 > JMPZ ~19, ->30 23 > NOP 24 FAST_CONCAT ~20 !3, '+%3Cstrong%3EApplication+ID%3C%2Fstrong%3E%3A+' 25 FETCH_OBJ_R ~21 !5, 'id' 26 CONCAT ~22 ~20, ~21 27 CONCAT ~23 ~22, '%3Cbr+%2F%3E' 28 ASSIGN_OP 8 !6, ~23 29 > JMP ->36 8 30 > NOP 31 FAST_CONCAT ~25 !4, '+%3Cstrong%3EApplication+ID%3C%2Fstrong%3E%3A+%3Cspan+title%3D%27App+ID+and%2For+App+Secret+is+Invalid%27%3E' 32 FETCH_DIM_R ~26 !1, 'appId' 33 CONCAT ~27 ~25, ~26 34 CONCAT ~28 ~27, '%3C%2Fspan%3E%3Cbr+%2F%3E' 35 ASSIGN_OP 8 !6, ~28 9 36 > ISSET_ISEMPTY_PROP_OBJ !5, 'name' 37 > JMPZ ~30, ->45 38 > NOP 39 FAST_CONCAT ~31 !3, '+%3Cstrong%3EApplication+Name%3C%2Fstrong%3E%3A+' 40 FETCH_OBJ_R ~32 !5, 'name' 41 CONCAT ~33 ~31, ~32 42 CONCAT ~34 ~33, '%3Cbr+%2F%3E' 43 ASSIGN_OP 8 !6, ~34 44 > JMP ->48 10 45 > NOP 46 FAST_CONCAT ~36 !4, '+%3Cstrong%3EApplication+Name%3C%2Fstrong%3E%3A+%3Cbr+%2F%3E' 47 ASSIGN_OP 8 !6, ~36 12 48 > ISSET_ISEMPTY_DIM_OBJ 0 ~38 !2, 'admintoken' 49 > JMPZ_EX ~38 ~38, ->53 50 > FETCH_DIM_R ~39 !2, 'admintoken' 51 IS_NOT_EQUAL ~40 ~39, '' 52 BOOL ~38 ~40 53 > > JMPZ ~38, ->58 13 54 > NOP 55 FAST_CONCAT ~41 !3, '+%3Cstrong%3EApplication+Administrator+Token%3C%2Fstrong%3E%3A+Installed' 56 ASSIGN_OP 8 !6, ~41 57 > JMP ->61 15 58 > NOP 59 FAST_CONCAT ~43 !4, '+%3Cstrong%3EApplication+Administrator+Token%3C%2Fstrong%3E%3A%0A++++++++%3Cspan+title%3D%27Logout+and+Signup+%2B+Authorize+with+a+user+who+is+an+administrator+of+the+configured+facebook+application+to+install+this+token%27%3E%0A++++++++++++Not+Installed%0A++++++++%3C%2Fspan%3E%3Cbr+%2F%3E' 60 ASSIGN_OP 8 !6, ~43 20 61 > ASSIGN_OP 8 !6, '%3C%2Fdiv%3E%0A++++++++++++%3Cscript%3E%24%28+%22%23admindiv%22+%29.tooltip%28%29%3B%3C%2Fscript%3E' 22 62 > RETURN !6 24 63 > > RETURN 1
Generated using Vulcan Logic Dumper, using php 8.0.0