Finding entry points Branch analysis from position: 0 2 jumps found. (Code = 77) Position 1 = 30, Position 2 = 37 Branch analysis from position: 30 2 jumps found. (Code = 78) Position 1 = 31, Position 2 = 37 Branch analysis from position: 31 1 jumps found. (Code = 42) Position 1 = 30 Branch analysis from position: 30 Branch analysis from position: 37 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 37 filename: /in/PB10B function name: (null) number of ops: 40 compiled vars: !0 = $settings, !1 = $url, !2 = $getfield, !3 = $requestMethod, !4 = $twitter, !5 = $response, !6 = $valid_data, !7 = $value, !8 = $key line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 357 0 E > ASSIGN !0, <array> 364 1 ASSIGN !1, 'https%3A%2F%2Fapi.twitter.com%2F1.1%2Fstatuses%2Fuser_timeline.json' 365 2 ASSIGN !2, '%3Fscreen_name%3Da2zwebhelp' 366 3 ASSIGN !3, 'GET' 368 4 NEW $13 'TwitterAPIExchange' 5 SEND_VAR_EX !0 6 DO_FCALL 0 7 ASSIGN !4, $13 369 8 INIT_METHOD_CALL !4, 'setGetfield' 9 SEND_VAR_EX !2 10 DO_FCALL 0 $16 370 11 INIT_METHOD_CALL $16, 'buildOauth' 12 SEND_VAR_EX !1 13 SEND_VAR_EX !3 14 DO_FCALL 0 $17 371 15 INIT_METHOD_CALL $17, 'performRequest' 16 DO_FCALL 0 $18 369 17 ASSIGN !5, $18 374 18 INIT_FCALL 'var_dump' 19 INIT_FCALL 'json_decode' 20 SEND_VAR !5 21 DO_ICALL $20 22 SEND_VAR $20 23 DO_ICALL 377 24 INIT_FCALL 'json_decode' 25 SEND_VAR !5 26 DO_ICALL $22 27 ASSIGN !6, $22 378 28 ECHO '%3Cul%3E' 379 29 > FE_RESET_R $24 !6, ->37 30 > > FE_FETCH_R ~25 $24, !7, ->37 31 > ASSIGN !8, ~25 380 32 ECHO '%3Cli%3E' 381 33 FETCH_OBJ_R ~27 !7, 'text' 34 ECHO ~27 382 35 ECHO '%3C%2Fli%3E' 379 36 > JMP ->30 37 > FE_FREE $24 384 38 ECHO '%3C%2Ful%3E' 385 39 > RETURN 1 Class TwitterAPIExchange: Function __construct: Finding entry points Branch analysis from position: 0 2 jumps found. (Code = 43) Position 1 = 9, Position 2 = 13 Branch analysis from position: 9 1 jumps found. (Code = 108) Position 1 = -2 Branch analysis from position: 13 2 jumps found. (Code = 47) Position 1 = 16, Position 2 = 19 Branch analysis from position: 16 2 jumps found. (Code = 47) Position 1 = 20, Position 2 = 23 Branch analysis from position: 20 2 jumps found. (Code = 47) Position 1 = 24, Position 2 = 27 Branch analysis from position: 24 2 jumps found. (Code = 43) Position 1 = 28, Position 2 = 32 Branch analysis from position: 28 1 jumps found. (Code = 108) Position 1 = -2 Branch analysis from position: 32 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 27 Branch analysis from position: 23 Branch analysis from position: 19 filename: /in/PB10B function name: __construct number of ops: 45 compiled vars: !0 = $settings line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 62 0 E > RECV !0 64 1 INIT_FCALL 'in_array' 2 SEND_VAL 'curl' 3 INIT_FCALL 'get_loaded_extensions' 4 DO_ICALL $1 5 SEND_VAR $1 6 DO_ICALL $2 7 BOOL_NOT ~3 $2 8 > JMPZ ~3, ->13 66 9 > NEW $4 'Exception' 10 SEND_VAL_EX 'You+need+to+install+cURL%2C+see%3A+http%3A%2F%2Fcurl.haxx.se%2Fdocs%2Finstall.html' 11 DO_FCALL 0 12 > THROW 0 $4 69 13 > ISSET_ISEMPTY_DIM_OBJ 0 ~6 !0, 'oauth_access_token' 14 BOOL_NOT ~7 ~6 15 > JMPNZ_EX ~7 ~7, ->19 70 16 > ISSET_ISEMPTY_DIM_OBJ 0 ~8 !0, 'oauth_access_token_secret' 17 BOOL_NOT ~9 ~8 18 BOOL ~7 ~9 19 > > JMPNZ_EX ~7 ~7, ->23 71 20 > ISSET_ISEMPTY_DIM_OBJ 0 ~10 !0, 'consumer_key' 21 BOOL_NOT ~11 ~10 22 BOOL ~7 ~11 23 > > JMPNZ_EX ~7 ~7, ->27 72 24 > ISSET_ISEMPTY_DIM_OBJ 0 ~12 !0, 'consumer_secret' 25 BOOL_NOT ~13 ~12 26 BOOL ~7 ~13 27 > > JMPZ ~7, ->32 74 28 > NEW $14 'Exception' 29 SEND_VAL_EX 'Make+sure+you+are+passing+in+the+correct+parameters' 30 DO_FCALL 0 31 > THROW 0 $14 76 32 > FETCH_DIM_R ~17 !0, 'oauth_access_token' 33 ASSIGN_OBJ 'oauth_access_token' 34 OP_DATA ~17 77 35 FETCH_DIM_R ~19 !0, 'oauth_access_token_secret' 36 ASSIGN_OBJ 'oauth_access_token_secret' 37 OP_DATA ~19 78 38 FETCH_DIM_R ~21 !0, 'consumer_key' 39 ASSIGN_OBJ 'consumer_key' 40 OP_DATA ~21 79 41 FETCH_DIM_R ~23 !0, 'consumer_secret' 42 ASSIGN_OBJ 'consumer_secret' 43 OP_DATA ~23 80 44 > RETURN null End of function __construct Function setpostfields: Finding entry points Branch analysis from position: 0 2 jumps found. (Code = 43) Position 1 = 6, Position 2 = 10 Branch analysis from position: 6 1 jumps found. (Code = 108) Position 1 = -2 Branch analysis from position: 10 2 jumps found. (Code = 46) Position 1 = 12, Position 2 = 20 Branch analysis from position: 12 2 jumps found. (Code = 43) Position 1 = 21, Position 2 = 28 Branch analysis from position: 21 2 jumps found. (Code = 125) Position 1 = 29, Position 2 = 40 Branch analysis from position: 29 2 jumps found. (Code = 126) Position 1 = 30, Position 2 = 40 Branch analysis from position: 30 2 jumps found. (Code = 43) Position 1 = 33, Position 2 = 39 Branch analysis from position: 33 2 jumps found. (Code = 43) Position 1 = 35, Position 2 = 37 Branch analysis from position: 35 1 jumps found. (Code = 42) Position 1 = 38 Branch analysis from position: 38 1 jumps found. (Code = 42) Position 1 = 29 Branch analysis from position: 29 Branch analysis from position: 37 1 jumps found. (Code = 42) Position 1 = 29 Branch analysis from position: 29 Branch analysis from position: 39 Branch analysis from position: 40 2 jumps found. (Code = 43) Position 1 = 46, Position 2 = 54 Branch analysis from position: 46 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 54 Branch analysis from position: 40 Branch analysis from position: 28 Branch analysis from position: 20 filename: /in/PB10B function name: setPostfields number of ops: 57 compiled vars: !0 = $array, !1 = $value, !2 = $key line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 90 0 E > RECV !0 92 1 INIT_METHOD_CALL 'getGetfield' 2 DO_FCALL 0 $3 3 TYPE_CHECK 2 ~4 $3 4 BOOL_NOT ~5 ~4 5 > JMPZ ~5, ->10 94 6 > NEW $6 'Exception' 7 SEND_VAL_EX 'You+can+only+choose+get+OR+post+fields.' 8 DO_FCALL 0 9 > THROW 0 $6 97 10 > ISSET_ISEMPTY_DIM_OBJ 0 ~8 !0, 'status' 11 > JMPZ_EX ~8 ~8, ->20 12 > INIT_FCALL 'substr' 13 FETCH_DIM_R ~9 !0, 'status' 14 SEND_VAL ~9 15 SEND_VAL 0 16 SEND_VAL 1 17 DO_ICALL $10 18 IS_IDENTICAL ~11 $10, '%40' 19 BOOL ~8 ~11 20 > > JMPZ ~8, ->28 99 21 > INIT_FCALL 'sprintf' 22 SEND_VAL '%00%25s' 23 FETCH_DIM_R ~13 !0, 'status' 24 SEND_VAL ~13 25 DO_ICALL $14 26 ASSIGN_DIM !0, 'status' 27 OP_DATA $14 101 28 > > FE_RESET_RW $15 !0, ->40 29 > > FE_FETCH_RW ~16 $15, !1, ->40 30 > ASSIGN !2, ~16 103 31 TYPE_CHECK 12 !1 32 > JMPZ ~18, ->39 105 33 > TYPE_CHECK 8 !1 34 > JMPZ ~19, ->37 35 > QM_ASSIGN ~20 'true' 36 > JMP ->38 37 > QM_ASSIGN ~20 'false' 38 > ASSIGN !1, ~20 101 39 > > JMP ->29 40 > FE_FREE $15 109 41 ASSIGN_OBJ 'postfields' 42 OP_DATA !0 112 43 FETCH_OBJ_IS ~23 'oauth' 44 ISSET_ISEMPTY_DIM_OBJ 0 ~23, 'oauth_signature' 45 > JMPZ ~24, ->54 113 46 > INIT_METHOD_CALL 'buildOauth' 47 CHECK_FUNC_ARG 48 FETCH_OBJ_FUNC_ARG $25 'url' 49 SEND_FUNC_ARG $25 50 CHECK_FUNC_ARG 51 FETCH_OBJ_FUNC_ARG $26 'requestMethod' 52 SEND_FUNC_ARG $26 53 DO_FCALL 0 115 54 > FETCH_THIS ~28 55 > RETURN ~28 116 56* > RETURN null End of function setpostfields Function setgetfield: Finding entry points Branch analysis from position: 0 2 jumps found. (Code = 43) Position 1 = 6, Position 2 = 10 Branch analysis from position: 6 1 jumps found. (Code = 108) Position 1 = -2 Branch analysis from position: 10 2 jumps found. (Code = 77) Position 1 = 22, Position 2 = 37 Branch analysis from position: 22 2 jumps found. (Code = 78) Position 1 = 23, Position 2 = 37 Branch analysis from position: 23 2 jumps found. (Code = 43) Position 1 = 25, Position 2 = 36 Branch analysis from position: 25 1 jumps found. (Code = 42) Position 1 = 22 Branch analysis from position: 22 Branch analysis from position: 36 Branch analysis from position: 37 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 37 filename: /in/PB10B function name: setGetfield number of ops: 47 compiled vars: !0 = $string, !1 = $getfields, !2 = $params, !3 = $field, !4 = $key, !5 = $value line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 127 0 E > RECV !0 129 1 INIT_METHOD_CALL 'getPostfields' 2 DO_FCALL 0 $6 3 TYPE_CHECK 2 ~7 $6 4 BOOL_NOT ~8 ~7 5 > JMPZ ~8, ->10 131 6 > NEW $9 'Exception' 7 SEND_VAL_EX 'You+can+only+choose+get+OR+post+fields.' 8 DO_FCALL 0 9 > THROW 0 $9 134 10 > INIT_FCALL 'preg_replace' 11 SEND_VAL '%2F%5E%5C%3F%2F' 12 SEND_VAL '' 13 INIT_FCALL 'explode' 14 SEND_VAL '%26' 15 SEND_VAR !0 16 DO_ICALL $11 17 SEND_VAR $11 18 DO_ICALL $12 19 ASSIGN !1, $12 135 20 ASSIGN !2, <array> 136 21 > FE_RESET_R $15 !1, ->37 22 > > FE_FETCH_R $15, !3, ->37 138 23 > IS_NOT_IDENTICAL !3, '' 24 > JMPZ ~16, ->36 140 25 > INIT_FCALL 'explode' 26 SEND_VAL '%3D' 27 SEND_VAR !3 28 DO_ICALL $17 29 FETCH_LIST_R $18 $17, 0 30 ASSIGN !4, $18 31 FETCH_LIST_R $20 $17, 1 32 ASSIGN !5, $20 33 FREE $17 141 34 ASSIGN_DIM !2, !4 35 OP_DATA !5 136 36 > > JMP ->22 37 > FE_FREE $15 144 38 INIT_FCALL 'http_build_query' 39 SEND_VAR !2 40 DO_ICALL $24 41 CONCAT ~25 '%3F', $24 42 ASSIGN_OBJ 'getfield' 43 OP_DATA ~25 146 44 FETCH_THIS ~26 45 > RETURN ~26 147 46* > RETURN null End of function setgetfield Function getgetfield: Finding entry points Branch analysis from position: 0 1 jumps found. (Code = 62) Position 1 = -2 filename: /in/PB10B function name: getGetfield number of ops: 3 compiled vars: none line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 156 0 E > FETCH_OBJ_R ~0 'getfield' 1 > RETURN ~0 157 2* > RETURN null End of function getgetfield Function getpostfields: Finding entry points Branch analysis from position: 0 1 jumps found. (Code = 62) Position 1 = -2 filename: /in/PB10B function name: getPostfields number of ops: 3 compiled vars: none line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 166 0 E > FETCH_OBJ_R ~0 'postfields' 1 > RETURN ~0 167 2* > RETURN null End of function getpostfields Function buildoauth: Finding entry points Branch analysis from position: 0 2 jumps found. (Code = 43) Position 1 = 8, Position 2 = 12 Branch analysis from position: 8 1 jumps found. (Code = 108) Position 1 = -2 Branch analysis from position: 12 2 jumps found. (Code = 43) Position 1 = 37, Position 2 = 65 Branch analysis from position: 37 2 jumps found. (Code = 77) Position 1 = 48, Position 2 = 64 Branch analysis from position: 48 2 jumps found. (Code = 78) Position 1 = 49, Position 2 = 64 Branch analysis from position: 49 2 jumps found. (Code = 43) Position 1 = 56, Position 2 = 63 Branch analysis from position: 56 1 jumps found. (Code = 42) Position 1 = 48 Branch analysis from position: 48 Branch analysis from position: 63 Branch analysis from position: 64 2 jumps found. (Code = 43) Position 1 = 71, Position 2 = 78 Branch analysis from position: 71 2 jumps found. (Code = 77) Position 1 = 72, Position 2 = 77 Branch analysis from position: 72 2 jumps found. (Code = 78) Position 1 = 73, Position 2 = 77 Branch analysis from position: 73 1 jumps found. (Code = 42) Position 1 = 72 Branch analysis from position: 72 Branch analysis from position: 77 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 77 Branch analysis from position: 78 Branch analysis from position: 64 Branch analysis from position: 65 filename: /in/PB10B function name: buildOauth number of ops: 114 compiled vars: !0 = $url, !1 = $requestMethod, !2 = $consumer_key, !3 = $consumer_secret, !4 = $oauth_access_token, !5 = $oauth_access_token_secret, !6 = $oauth, !7 = $getfield, !8 = $getfields, !9 = $g, !10 = $split, !11 = $postfields, !12 = $value, !13 = $key, !14 = $base_info, !15 = $composite_key, !16 = $oauth_signature line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 180 0 E > RECV !0 1 RECV !1 182 2 INIT_FCALL 'strtolower' 3 SEND_VAR !1 4 DO_ICALL $17 5 IN_ARRAY ~18 $17, <array> 6 BOOL_NOT ~19 ~18 7 > JMPZ ~19, ->12 184 8 > NEW $20 'Exception' 9 SEND_VAL_EX 'Request+method+must+be+either+POST+or+GET' 10 DO_FCALL 0 11 > THROW 0 $20 187 12 > FETCH_OBJ_R ~22 'consumer_key' 13 ASSIGN !2, ~22 188 14 FETCH_OBJ_R ~24 'consumer_secret' 15 ASSIGN !3, ~24 189 16 FETCH_OBJ_R ~26 'oauth_access_token' 17 ASSIGN !4, ~26 190 18 FETCH_OBJ_R ~28 'oauth_access_token_secret' 19 ASSIGN !5, ~28 193 20 INIT_ARRAY ~30 !2, 'oauth_consumer_key' 194 21 INIT_FCALL 'time' 22 DO_ICALL $31 23 ADD_ARRAY_ELEMENT ~30 $31, 'oauth_nonce' 195 24 ADD_ARRAY_ELEMENT ~30 'HMAC-SHA1', 'oauth_signature_method' 196 25 ADD_ARRAY_ELEMENT ~30 !4, 'oauth_token' 197 26 INIT_FCALL 'time' 27 DO_ICALL $32 28 ADD_ARRAY_ELEMENT ~30 $32, 'oauth_timestamp' 198 29 ADD_ARRAY_ELEMENT ~30 '1.0', 'oauth_version' 192 30 ASSIGN !6, ~30 201 31 INIT_METHOD_CALL 'getGetfield' 32 DO_FCALL 0 $34 33 ASSIGN !7, $34 203 34 TYPE_CHECK 2 ~36 !7 35 BOOL_NOT ~37 ~36 36 > JMPZ ~37, ->65 205 37 > INIT_FCALL 'str_replace' 38 SEND_VAL '%3F' 39 SEND_VAL '' 40 INIT_FCALL 'explode' 41 SEND_VAL '%26' 42 SEND_VAR !7 43 DO_ICALL $38 44 SEND_VAR $38 45 DO_ICALL $39 46 ASSIGN !8, $39 206 47 > FE_RESET_R $41 !8, ->64 48 > > FE_FETCH_R $41, !9, ->64 208 49 > INIT_FCALL 'explode' 50 SEND_VAL '%3D' 51 SEND_VAR !9 52 DO_ICALL $42 53 ASSIGN !10, $42 210 54 ISSET_ISEMPTY_DIM_OBJ 0 !10, 1 55 > JMPZ ~44, ->63 212 56 > FETCH_DIM_R ~45 !10, 0 57 INIT_FCALL 'urldecode' 58 FETCH_DIM_R ~47 !10, 1 59 SEND_VAL ~47 60 DO_ICALL $48 61 ASSIGN_DIM !6, ~45 62 OP_DATA $48 206 63 > > JMP ->48 64 > FE_FREE $41 217 65 > INIT_METHOD_CALL 'getPostfields' 66 DO_FCALL 0 $49 67 ASSIGN !11, $49 218 68 TYPE_CHECK 2 ~51 !11 69 BOOL_NOT ~52 ~51 70 > JMPZ ~52, ->78 219 71 > > FE_RESET_R $53 !11, ->77 72 > > FE_FETCH_R ~54 $53, !12, ->77 73 > ASSIGN !13, ~54 220 74 ASSIGN_DIM !6, !13 75 OP_DATA !12 219 76 > JMP ->72 77 > FE_FREE $53 223 78 > INIT_METHOD_CALL 'buildBaseString' 79 SEND_VAR_EX !0 80 SEND_VAR_EX !1 81 SEND_VAR_EX !6 82 DO_FCALL 0 $57 83 ASSIGN !14, $57 224 84 INIT_FCALL 'rawurlencode' 85 SEND_VAR !3 86 DO_ICALL $59 87 CONCAT ~60 $59, '%26' 88 INIT_FCALL 'rawurlencode' 89 SEND_VAR !5 90 DO_ICALL $61 91 CONCAT ~62 ~60, $61 92 ASSIGN !15, ~62 225 93 INIT_FCALL 'base64_encode' 94 INIT_FCALL 'hash_hmac' 95 SEND_VAL 'sha1' 96 SEND_VAR !14 97 SEND_VAR !15 98 SEND_VAL <true> 99 DO_ICALL $64 100 SEND_VAR $64 101
Generated using Vulcan Logic Dumper, using php 8.0.0