3v4l.org

run code in 300+ PHP versions simultaneously
<?php $packed = '{"nonce":"xobK27GhMR960tSTcg5nrFSy35uwkKYn","key":"px2BaIAx17vdBQFdnLBimERK6KHqHNxhJN0PzKfhMHE","secretbox":"RFgczAJ_L0hOpIb_O0k9dFE58Cz-dagdEA3aHxUq_Q6jCEzTdzlMQyI7jEoauWOlH7m3EEXv4OFiD-Ke3otsoLJV0TPFbV2HV59pGNsSux9e"}'; $decoded = json_decode($packed, true); function base64url_decode(string $str): string { return base64_decode(strtr($str, '-_', '+/')); } $nonce = base64url_decode($decoded['nonce']); $key = base64url_decode($decoded['key']); $secretbox = base64url_decode($decoded['secretbox']); var_dump(sodium_crypto_secretbox_open($secretbox, $nonce, $key));
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/OODYk
function name:  (null)
number of ops:  30
compiled vars:  !0 = $packed, !1 = $decoded, !2 = $nonce, !3 = $key, !4 = $secretbox
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    2     0  E >   ASSIGN                                                   !0, '%7B%22nonce%22%3A%22xobK27GhMR960tSTcg5nrFSy35uwkKYn%22%2C%22key%22%3A%22px2BaIAx17vdBQFdnLBimERK6KHqHNxhJN0PzKfhMHE%22%2C%22secretbox%22%3A%22RFgczAJ_L0hOpIb_O0k9dFE58Cz-dagdEA3aHxUq_Q6jCEzTdzlMQyI7jEoauWOlH7m3EEXv4OFiD-Ke3otsoLJV0TPFbV2HV59pGNsSux9e%22%7D'
    4     1        INIT_FCALL                                               'json_decode'
          2        SEND_VAR                                                 !0
          3        SEND_VAL                                                 <true>
          4        DO_ICALL                                         $6      
          5        ASSIGN                                                   !1, $6
   10     6        INIT_FCALL                                               'base64url_decode'
          7        FETCH_DIM_R                                      ~8      !1, 'nonce'
          8        SEND_VAL                                                 ~8
          9        DO_FCALL                                      0  $9      
         10        ASSIGN                                                   !2, $9
   11    11        INIT_FCALL                                               'base64url_decode'
         12        FETCH_DIM_R                                      ~11     !1, 'key'
         13        SEND_VAL                                                 ~11
         14        DO_FCALL                                      0  $12     
         15        ASSIGN                                                   !3, $12
   12    16        INIT_FCALL                                               'base64url_decode'
         17        FETCH_DIM_R                                      ~14     !1, 'secretbox'
         18        SEND_VAL                                                 ~14
         19        DO_FCALL                                      0  $15     
         20        ASSIGN                                                   !4, $15
   14    21        INIT_FCALL                                               'var_dump'
         22        INIT_FCALL_BY_NAME                                       'sodium_crypto_secretbox_open'
         23        SEND_VAR_EX                                              !4
         24        SEND_VAR_EX                                              !2
         25        SEND_VAR_EX                                              !3
         26        DO_FCALL                                      0  $17     
         27        SEND_VAR                                                 $17
         28        DO_ICALL                                                 
         29      > RETURN                                                   1

Function base64url_decode:
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/OODYk
function name:  base64url_decode
number of ops:  13
compiled vars:  !0 = $str
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    6     0  E >   RECV                                             !0      
    7     1        INIT_FCALL                                               'base64_decode'
          2        INIT_FCALL                                               'strtr'
          3        SEND_VAR                                                 !0
          4        SEND_VAL                                                 '-_'
          5        SEND_VAL                                                 '%2B%2F'
          6        DO_ICALL                                         $1      
          7        SEND_VAR                                                 $1
          8        DO_ICALL                                         $2      
          9        VERIFY_RETURN_TYPE                                       $2
         10      > RETURN                                                   $2
    8    11*       VERIFY_RETURN_TYPE                                       
         12*     > RETURN                                                   null

End of function base64url_decode

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
179.29 ms | 1403 KiB | 24 Q