Finding entry points Branch analysis from position: 0 1 jumps found. (Code = 62) Position 1 = -2 filename: /in/OODYk function name: (null) number of ops: 30 compiled vars: !0 = $packed, !1 = $decoded, !2 = $nonce, !3 = $key, !4 = $secretbox line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 2 0 E > ASSIGN !0, '%7B%22nonce%22%3A%22xobK27GhMR960tSTcg5nrFSy35uwkKYn%22%2C%22key%22%3A%22px2BaIAx17vdBQFdnLBimERK6KHqHNxhJN0PzKfhMHE%22%2C%22secretbox%22%3A%22RFgczAJ_L0hOpIb_O0k9dFE58Cz-dagdEA3aHxUq_Q6jCEzTdzlMQyI7jEoauWOlH7m3EEXv4OFiD-Ke3otsoLJV0TPFbV2HV59pGNsSux9e%22%7D' 4 1 INIT_FCALL 'json_decode' 2 SEND_VAR !0 3 SEND_VAL <true> 4 DO_ICALL $6 5 ASSIGN !1, $6 10 6 INIT_FCALL 'base64url_decode' 7 FETCH_DIM_R ~8 !1, 'nonce' 8 SEND_VAL ~8 9 DO_FCALL 0 $9 10 ASSIGN !2, $9 11 11 INIT_FCALL 'base64url_decode' 12 FETCH_DIM_R ~11 !1, 'key' 13 SEND_VAL ~11 14 DO_FCALL 0 $12 15 ASSIGN !3, $12 12 16 INIT_FCALL 'base64url_decode' 17 FETCH_DIM_R ~14 !1, 'secretbox' 18 SEND_VAL ~14 19 DO_FCALL 0 $15 20 ASSIGN !4, $15 14 21 INIT_FCALL 'var_dump' 22 INIT_FCALL_BY_NAME 'sodium_crypto_secretbox_open' 23 SEND_VAR_EX !4 24 SEND_VAR_EX !2 25 SEND_VAR_EX !3 26 DO_FCALL 0 $17 27 SEND_VAR $17 28 DO_ICALL 29 > RETURN 1 Function base64url_decode: Finding entry points Branch analysis from position: 0 1 jumps found. (Code = 62) Position 1 = -2 filename: /in/OODYk function name: base64url_decode number of ops: 13 compiled vars: !0 = $str line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 6 0 E > RECV !0 7 1 INIT_FCALL 'base64_decode' 2 INIT_FCALL 'strtr' 3 SEND_VAR !0 4 SEND_VAL '-_' 5 SEND_VAL '%2B%2F' 6 DO_ICALL $1 7 SEND_VAR $1 8 DO_ICALL $2 9 VERIFY_RETURN_TYPE $2 10 > RETURN $2 8 11* VERIFY_RETURN_TYPE 12* > RETURN null End of function base64url_decode
Generated using Vulcan Logic Dumper, using php 8.0.0