Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename: /in/OODYk
function name: (null)
number of ops: 30
compiled vars: !0 = $packed, !1 = $decoded, !2 = $nonce, !3 = $key, !4 = $secretbox
line #* E I O op fetch ext return operands
-------------------------------------------------------------------------------------
2 0 E > ASSIGN !0, '%7B%22nonce%22%3A%22xobK27GhMR960tSTcg5nrFSy35uwkKYn%22%2C%22key%22%3A%22px2BaIAx17vdBQFdnLBimERK6KHqHNxhJN0PzKfhMHE%22%2C%22secretbox%22%3A%22RFgczAJ_L0hOpIb_O0k9dFE58Cz-dagdEA3aHxUq_Q6jCEzTdzlMQyI7jEoauWOlH7m3EEXv4OFiD-Ke3otsoLJV0TPFbV2HV59pGNsSux9e%22%7D'
4 1 INIT_FCALL 'json_decode'
2 SEND_VAR !0
3 SEND_VAL <true>
4 DO_ICALL $6
5 ASSIGN !1, $6
10 6 INIT_FCALL 'base64url_decode'
7 FETCH_DIM_R ~8 !1, 'nonce'
8 SEND_VAL ~8
9 DO_FCALL 0 $9
10 ASSIGN !2, $9
11 11 INIT_FCALL 'base64url_decode'
12 FETCH_DIM_R ~11 !1, 'key'
13 SEND_VAL ~11
14 DO_FCALL 0 $12
15 ASSIGN !3, $12
12 16 INIT_FCALL 'base64url_decode'
17 FETCH_DIM_R ~14 !1, 'secretbox'
18 SEND_VAL ~14
19 DO_FCALL 0 $15
20 ASSIGN !4, $15
14 21 INIT_FCALL 'var_dump'
22 INIT_FCALL_BY_NAME 'sodium_crypto_secretbox_open'
23 SEND_VAR_EX !4
24 SEND_VAR_EX !2
25 SEND_VAR_EX !3
26 DO_FCALL 0 $17
27 SEND_VAR $17
28 DO_ICALL
29 > RETURN 1
Function base64url_decode:
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename: /in/OODYk
function name: base64url_decode
number of ops: 13
compiled vars: !0 = $str
line #* E I O op fetch ext return operands
-------------------------------------------------------------------------------------
6 0 E > RECV !0
7 1 INIT_FCALL 'base64_decode'
2 INIT_FCALL 'strtr'
3 SEND_VAR !0
4 SEND_VAL '-_'
5 SEND_VAL '%2B%2F'
6 DO_ICALL $1
7 SEND_VAR $1
8 DO_ICALL $2
9 VERIFY_RETURN_TYPE $2
10 > RETURN $2
8 11* VERIFY_RETURN_TYPE
12* > RETURN null
End of function base64url_decode
Generated using Vulcan Logic Dumper, using php 8.0.0