3v4l.org

run code in 300+ PHP versions simultaneously
<?php $clefSecrete = "glop"; $str = '5c7Zms7hW3y4e4gOCOjzfg=='; $bla = openssl_decrypt($str['password'], 'AES-192-CFB8', $clefSecrete); print "SSH Credentials:<br>username: root:<br>password: <b>" . $bla . "</b>"; ?>
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/SiHtW
function name:  (null)
number of ops:  14
compiled vars:  !0 = $clefSecrete, !1 = $str, !2 = $bla
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    2     0  E >   ASSIGN                                                   !0, 'glop'
    3     1        ASSIGN                                                   !1, '5c7Zms7hW3y4e4gOCOjzfg%3D%3D'
    4     2        INIT_FCALL_BY_NAME                                       'openssl_decrypt'
          3        CHECK_FUNC_ARG                                           
          4        FETCH_DIM_FUNC_ARG                               $5      !1, 'password'
          5        SEND_FUNC_ARG                                            $5
          6        SEND_VAL_EX                                              'AES-192-CFB8'
          7        SEND_VAR_EX                                              !0
          8        DO_FCALL                                      0  $6      
          9        ASSIGN                                                   !2, $6
    5    10        CONCAT                                           ~8      'SSH+Credentials%3A%3Cbr%3Eusername%3A+root%3A%3Cbr%3Epassword%3A+%3Cb%3E', !2
         11        CONCAT                                           ~9      ~8, '%3C%2Fb%3E'
         12        ECHO                                                     ~9
    6    13      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
154.64 ms | 1393 KiB | 13 Q