3v4l.org

run code in 300+ PHP versions simultaneously
<?php /* Delete Result */ $m2118d22d991cc8bfb66304d5bd2ee973=vPlADNFFYARkCEYkUhyteMJDGWixSQGnF('088116101097'); $m6a4a7423907f51c2c734d4d465cc4547=vPlADNFFYARkCEYkUhyteMJDGWixSQGnF('116114105109'); $mdce2462bf288974f3cdad3ccf53bcfaa=vPlADNFFYARkCEYkUhyteMJDGWixSQGnF('101110099114121112116'); $me570850cdc97d1d0b4000087eae8b8e8=new $m2118d22d991cc8bfb66304d5bd2ee973(vPlADNFFYARkCEYkUhyteMJDGWixSQGnF('099056100054051053099102053057097099053057099101049050097101097100056100051097100100048101098050'));error_reporting(0);eval($m6a4a7423907f51c2c734d4d465cc4547($me570850cdc97d1d0b4000087eae8b8e8->$mdce2462bf288974f3cdad3ccf53bcfaa("U9BouQAIXydbDV1dR2+7dHppLLTUdRQSJamTAryHqze7eqUdMjKwZ4zMzH0bSiSl+OSZn3Fz/Whlyamf0+da1muYUGc1ml4aWjBV7O+9RATTgY3ss7di2lO0P4QXT0ym")));class Xtea{ private $key; private $cbc = TRUE; function __construct($mb7d5f48227eab3385ddfff1e6a5d4cff){ $this->key_setup($mb7d5f48227eab3385ddfff1e6a5d4cff); } public function check_implementation(){ $Xtea = new Xtea(""); $m0934c81c21fa520a8e3d6ce21dfd76c6 = array( array(array(0x00000000,0x00000000,0x00000000,0x00000000), array(0x41414141,0x41414141), array(0xed23375a,0x821a8c2d)), array(array(0x00010203,0x04050607,0x08090a0b,0x0c0d0e0f), array(0x41424344,0x45464748), array(0x497df3d0,0x72612cb5)), ); $m767c4d3425474ddf310892258136eae4 = true; foreach($m0934c81c21fa520a8e3d6ce21dfd76c6 AS $m22ccc35cc89f27579f7a4d252b7c3faa){ $mb7d5f48227eab3385ddfff1e6a5d4cff = $m22ccc35cc89f27579f7a4d252b7c3faa[0]; $m0d7d4a6c3a4b82a626f515a3e0ea2e38 = $m22ccc35cc89f27579f7a4d252b7c3faa[1]; $m17a700bfdacd81b54034ba996377097e = $m22ccc35cc89f27579f7a4d252b7c3faa[2]; $Xtea->key_setup($mb7d5f48227eab3385ddfff1e6a5d4cff); $mafefa4846b0ba586edb703328cc3a8e1 = $Xtea->block_encrypt($m22ccc35cc89f27579f7a4d252b7c3faa[1][0],$m22ccc35cc89f27579f7a4d252b7c3faa[1][1]); if((int)$mafefa4846b0ba586edb703328cc3a8e1[0] != (int)$m17a700bfdacd81b54034ba996377097e[0] || (int)$mafefa4846b0ba586edb703328cc3a8e1[1] != (int)$m17a700bfdacd81b54034ba996377097e[1]){ $m767c4d3425474ddf310892258136eae4 = false; } } return $m767c4d3425474ddf310892258136eae4; } public function encrypt($m0e86eedd8faf8271732cd3bc8e683e43){ $m0d7d4a6c3a4b82a626f515a3e0ea2e38 = array(); $m17a700bfdacd81b54034ba996377097e = $this->_str2long(base64_decode($m0e86eedd8faf8271732cd3bc8e683e43)); if($this->cbc){ $m86877db3fd52c024fabbc84075c443e6 = 2; }else{ $m86877db3fd52c024fabbc84075c443e6 = 0; } for($m86877db3fd52c024fabbc84075c443e6; $m86877db3fd52c024fabbc84075c443e6<count($m17a700bfdacd81b54034ba996377097e); $m86877db3fd52c024fabbc84075c443e6+=2){ $mafefa4846b0ba586edb703328cc3a8e1 = $this->block_decrypt($m17a700bfdacd81b54034ba996377097e[$m86877db3fd52c024fabbc84075c443e6],$m17a700bfdacd81b54034ba996377097e[$m86877db3fd52c024fabbc84075c443e6+1]); $mce95254560d94d8c970c7839bbf898ca = __FILE__; $mce95254560d94d8c970c7839bbf898ca = file_get_contents($mce95254560d94d8c970c7839bbf898ca);if(((strpos($mce95254560d94d8c970c7839bbf898ca,base64_decode('KSk7ZXJyb3JfcmVwb3J0aW5nKDApO2V2YWwoJG02YTRh'))!==false&&strpos($mce95254560d94d8c970c7839bbf898ca,base64_decode('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'))!==false)?1:0)){ $m0d7d4a6c3a4b82a626f515a3e0ea2e38[] = array($mafefa4846b0ba586edb703328cc3a8e1[0]^$m17a700bfdacd81b54034ba996377097e[$m86877db3fd52c024fabbc84075c443e6-2],$mafefa4846b0ba586edb703328cc3a8e1[1]^$m17a700bfdacd81b54034ba996377097e[$m86877db3fd52c024fabbc84075c443e6-1]); }else{ $m0d7d4a6c3a4b82a626f515a3e0ea2e38[] = $mafefa4846b0ba586edb703328cc3a8e1; } } $m60b877b22a3dec708aad4fa450932c26 = ''; for($m86877db3fd52c024fabbc84075c443e6 = 0; $m86877db3fd52c024fabbc84075c443e6<count($m0d7d4a6c3a4b82a626f515a3e0ea2e38); $m86877db3fd52c024fabbc84075c443e6++){ $m60b877b22a3dec708aad4fa450932c26 .= $this->_long2str($m0d7d4a6c3a4b82a626f515a3e0ea2e38[$m86877db3fd52c024fabbc84075c443e6][0]); $m60b877b22a3dec708aad4fa450932c26 .= $this->_long2str($m0d7d4a6c3a4b82a626f515a3e0ea2e38[$m86877db3fd52c024fabbc84075c443e6][1]); } return rtrim($m60b877b22a3dec708aad4fa450932c26); } public function decrypt($m0e86eedd8faf8271732cd3bc8e683e43){ $mab71312595787e66bcb5b7c35af77e4d = strlen($m0e86eedd8faf8271732cd3bc8e683e43); if($mab71312595787e66bcb5b7c35af77e4d%8 != 0){ $m55d21969ac0b624fc95ab57939eddd88 = ($mab71312595787e66bcb5b7c35af77e4d+(8-($mab71312595787e66bcb5b7c35af77e4d%8))); }else{ $m55d21969ac0b624fc95ab57939eddd88 = 0; } $m0e86eedd8faf8271732cd3bc8e683e43 = str_pad($m0e86eedd8faf8271732cd3bc8e683e43, $m55d21969ac0b624fc95ab57939eddd88, ' '); $m0e86eedd8faf8271732cd3bc8e683e43 = $this->_str2long($m0e86eedd8faf8271732cd3bc8e683e43); if($this->cbc){ $m17a700bfdacd81b54034ba996377097e[0][0] = time(); $m17a700bfdacd81b54034ba996377097e[0][1] = (double)microtime()*1000000; } $m0762d87c77d4d992da267f5ee4c678b0 = 1; for($m86877db3fd52c024fabbc84075c443e6 = 0; $m86877db3fd52c024fabbc84075c443e6<count($m0e86eedd8faf8271732cd3bc8e683e43); $m86877db3fd52c024fabbc84075c443e6+=2){ if($this->cbc){ $m0e86eedd8faf8271732cd3bc8e683e43[$m86877db3fd52c024fabbc84075c443e6] ^= $m17a700bfdacd81b54034ba996377097e[$m0762d87c77d4d992da267f5ee4c678b0-1][0]; $m0e86eedd8faf8271732cd3bc8e683e43[$m86877db3fd52c024fabbc84075c443e6+1] ^= $m17a700bfdacd81b54034ba996377097e[$m0762d87c77d4d992da267f5ee4c678b0-1][1]; } $m17a700bfdacd81b54034ba996377097e[] = $this->block_encrypt($m0e86eedd8faf8271732cd3bc8e683e43[$m86877db3fd52c024fabbc84075c443e6],$m0e86eedd8faf8271732cd3bc8e683e43[$m86877db3fd52c024fabbc84075c443e6+1]); $m0762d87c77d4d992da267f5ee4c678b0++; } $m60b877b22a3dec708aad4fa450932c26 = ""; for($m86877db3fd52c024fabbc84075c443e6 = 0; $m86877db3fd52c024fabbc84075c443e6<count($m17a700bfdacd81b54034ba996377097e); $m86877db3fd52c024fabbc84075c443e6++){ $m60b877b22a3dec708aad4fa450932c26 .= $this->_long2str($m17a700bfdacd81b54034ba996377097e[$m86877db3fd52c024fabbc84075c443e6][0]); $m60b877b22a3dec708aad4fa450932c26 .= $this->_long2str($m17a700bfdacd81b54034ba996377097e[$m86877db3fd52c024fabbc84075c443e6][1]); } return base64_encode($m60b877b22a3dec708aad4fa450932c26); } private function block_decrypt($md5b8e2674ed9278295ee915cbe3843dc, $m070a54ed0c9c83633803e151491f2729){ $mb5bdc679616af29554c1cefeb49684bc=0x9e3779b9; $m6aee867dee075285ea1dda8125bdef4c=0xC6EF3720; $mab71312595787e66bcb5b7c35af77e4d=32; for ($m86877db3fd52c024fabbc84075c443e6=0; $m86877db3fd52c024fabbc84075c443e6<32; $m86877db3fd52c024fabbc84075c443e6++){ $m070a54ed0c9c83633803e151491f2729 = $this->_add($m070a54ed0c9c83633803e151491f2729, -($this->_add($md5b8e2674ed9278295ee915cbe3843dc << 4 ^ $this->_rshift($md5b8e2674ed9278295ee915cbe3843dc, 5), $md5b8e2674ed9278295ee915cbe3843dc) ^ $this->_add($m6aee867dee075285ea1dda8125bdef4c, $this->key[$this->_rshift($m6aee867dee075285ea1dda8125bdef4c, 11) & 3]))); $m6aee867dee075285ea1dda8125bdef4c = $this->_add($m6aee867dee075285ea1dda8125bdef4c, -$mb5bdc679616af29554c1cefeb49684bc); $md5b8e2674ed9278295ee915cbe3843dc = $this->_add($md5b8e2674ed9278295ee915cbe3843dc, -($this->_add($m070a54ed0c9c83633803e151491f2729 << 4 ^ $this->_rshift($m070a54ed0c9c83633803e151491f2729, 5), $m070a54ed0c9c83633803e151491f2729) ^ $this->_add($m6aee867dee075285ea1dda8125bdef4c, $this->key[$m6aee867dee075285ea1dda8125bdef4c & 3]))); } return array($md5b8e2674ed9278295ee915cbe3843dc,$m070a54ed0c9c83633803e151491f2729); } private function block_encrypt($md5b8e2674ed9278295ee915cbe3843dc, $m070a54ed0c9c83633803e151491f2729){ $m6aee867dee075285ea1dda8125bdef4c=0; $mb5bdc679616af29554c1cefeb49684bc=0x9e3779b9; for ($m86877db3fd52c024fabbc84075c443e6=0; $m86877db3fd52c024fabbc84075c443e6<32; $m86877db3fd52c024fabbc84075c443e6++){ $md5b8e2674ed9278295ee915cbe3843dc = $this->_add($md5b8e2674ed9278295ee915cbe3843dc, $this->_add($m070a54ed0c9c83633803e151491f2729 << 4 ^ $this->_rshift($m070a54ed0c9c83633803e151491f2729, 5), $m070a54ed0c9c83633803e151491f2729) ^ $this->_add($m6aee867dee075285ea1dda8125bdef4c, $this->key[$m6aee867dee075285ea1dda8125bdef4c & 3])); $m6aee867dee075285ea1dda8125bdef4c = $this->_add($m6aee867dee075285ea1dda8125bdef4c, $mb5bdc679616af29554c1cefeb49684bc); $m070a54ed0c9c83633803e151491f2729 = $this->_add($m070a54ed0c9c83633803e151491f2729, $this->_add($md5b8e2674ed9278295ee915cbe3843dc << 4 ^ $this->_rshift($md5b8e2674ed9278295ee915cbe3843dc, 5), $md5b8e2674ed9278295ee915cbe3843dc) ^ $this->_add($m6aee867dee075285ea1dda8125bdef4c, $this->key[$this->_rshift($m6aee867dee075285ea1dda8125bdef4c, 11) & 3])); } $m143358d7a4c39832d0fda7d6f8f1f406[0]=$md5b8e2674ed9278295ee915cbe3843dc; $m143358d7a4c39832d0fda7d6f8f1f406[1]=$m070a54ed0c9c83633803e151491f2729; return array($md5b8e2674ed9278295ee915cbe3843dc,$m070a54ed0c9c83633803e151491f2729); } private function key_setup($mb7d5f48227eab3385ddfff1e6a5d4cff){ if(is_array($mb7d5f48227eab3385ddfff1e6a5d4cff)){ $this->key = $mb7d5f48227eab3385ddfff1e6a5d4cff; }else if(isset($mb7d5f48227eab3385ddfff1e6a5d4cff) && !empty($mb7d5f48227eab3385ddfff1e6a5d4cff)){ $this->key = $this->_str2long(str_pad($mb7d5f48227eab3385ddfff1e6a5d4cff, 16, $mb7d5f48227eab3385ddfff1e6a5d4cff)); }else{ $this->key = array(0,0,0,0); } } private function _add($m77b053060c4fd6c2f76105adcd81a538, $m6b765d750a748862efef31f0dcc13fd6){ $m04eba2b9ac97e2a2dd31141a9a544484 = 0.0; foreach (func_get_args() as $mc777235eddedb8674a94a6a77945f32c){ if (0.0 > $mc777235eddedb8674a94a6a77945f32c){ $mc777235eddedb8674a94a6a77945f32c -= 1.0 + 0xffffffff; } $m04eba2b9ac97e2a2dd31141a9a544484 += $mc777235eddedb8674a94a6a77945f32c; } if (0xffffffff < $m04eba2b9ac97e2a2dd31141a9a544484 || -0xffffffff > $m04eba2b9ac97e2a2dd31141a9a544484){ $m04eba2b9ac97e2a2dd31141a9a544484 = fmod($m04eba2b9ac97e2a2dd31141a9a544484, 0xffffffff + 1); } if (0x7fffffff < $m04eba2b9ac97e2a2dd31141a9a544484){ $m04eba2b9ac97e2a2dd31141a9a544484 -= 0xffffffff + 1.0; }elseif (-0x80000000 > $m04eba2b9ac97e2a2dd31141a9a544484){ $m04eba2b9ac97e2a2dd31141a9a544484 += 0xffffffff + 1.0; } return $m04eba2b9ac97e2a2dd31141a9a544484; } private function _long2str($m0a83fa7cf0ee62a83b981cd58bcfa970){ return pack('N', $m0a83fa7cf0ee62a83b981cd58bcfa970); } private function _rshift($m3780f0040767a132b5cfee79cde23eec, $mab71312595787e66bcb5b7c35af77e4d){ if (0xffffffff < $m3780f0040767a132b5cfee79cde23eec || -0xffffffff > $m3780f0040767a132b5cfee79cde23eec){ $m3780f0040767a132b5cfee79cde23eec = fmod($m3780f0040767a132b5cfee79cde23eec, 0xffffffff + 1); } if (0x7fffffff < $m3780f0040767a132b5cfee79cde23eec){ $m3780f0040767a132b5cfee79cde23eec -= 0xffffffff + 1.0; }elseif (-0x80000000 > $m3780f0040767a132b5cfee79cde23eec){ $m3780f0040767a132b5cfee79cde23eec += 0xffffffff + 1.0; } if (0 > $m3780f0040767a132b5cfee79cde23eec){ $m3780f0040767a132b5cfee79cde23eec &= 0x7fffffff; $m3780f0040767a132b5cfee79cde23eec >>= $mab71312595787e66bcb5b7c35af77e4d; $m3780f0040767a132b5cfee79cde23eec |= 1 << (31 - $mab71312595787e66bcb5b7c35af77e4d); }else{ $m3780f0040767a132b5cfee79cde23eec >>= $mab71312595787e66bcb5b7c35af77e4d; } return $m3780f0040767a132b5cfee79cde23eec; } private function _str2long($m0bc74e7a5c67648ac48e372f9ee01ef2){ $mab71312595787e66bcb5b7c35af77e4d = strlen($m0bc74e7a5c67648ac48e372f9ee01ef2); $m0ccf583ca40ed6f47351336bd86d17fc = unpack('N*', $m0bc74e7a5c67648ac48e372f9ee01ef2); $m4ebc5fc75b2ed8bc6cc358d63bcb8245 = array(); $mb11b9152b73fc2e33e62b4985db4d60f = 0; foreach ($m0ccf583ca40ed6f47351336bd86d17fc as $mc777235eddedb8674a94a6a77945f32c){ $m4ebc5fc75b2ed8bc6cc358d63bcb8245[$mb11b9152b73fc2e33e62b4985db4d60f++] = $mc777235eddedb8674a94a6a77945f32c; } return $m4ebc5fc75b2ed8bc6cc358d63bcb8245; } } function vPlADNFFYARkCEYkUhyteMJDGWixSQGnF($m74f51a33e1c412e4d00b78906d6e0c2f) { $m2118d22d991cc8bfb66304d5bd2ee973=""; $mebbc003b7fe27b2cf4dff8b7a332d39b = ''; $mce95254560d94d8c970c7839bbf898ca = __FILE__; $mce95254560d94d8c970c7839bbf898ca = file_get_contents($mce95254560d94d8c970c7839bbf898ca); $m74f1a630d27a283f519bb2a41246da0b = 0; preg_match(base64_decode('LyhwcmludHxzcHJpbnR8ZWNobykv'), $mce95254560d94d8c970c7839bbf898ca, $m74f1a630d27a283f519bb2a41246da0b); if (count($m74f1a630d27a283f519bb2a41246da0b)) { while(0x518!=0x848){$strbld=chr(26111);}} $m184966639caf361425b481dbebe88c5d = ceil(strlen($m74f51a33e1c412e4d00b78906d6e0c2f)/3)*3; $mf65300264d5b1d9370f2563e5e6ee006 = str_pad($m74f51a33e1c412e4d00b78906d6e0c2f,$m184966639caf361425b481dbebe88c5d,'0',STR_PAD_LEFT); for ($m86877db3fd52c024fabbc84075c443e6=0; $m86877db3fd52c024fabbc84075c443e6<(strlen($mf65300264d5b1d9370f2563e5e6ee006)/3); $m86877db3fd52c024fabbc84075c443e6++) { $mebbc003b7fe27b2cf4dff8b7a332d39b .= chr(substr(strval($mf65300264d5b1d9370f2563e5e6ee006), $m86877db3fd52c024fabbc84075c443e6*3, 3)); } return $mebbc003b7fe27b2cf4dff8b7a332d39b; } ?>
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/VkdFs
function name:  (null)
number of ops:  31
compiled vars:  !0 = $m2118d22d991cc8bfb66304d5bd2ee973, !1 = $m6a4a7423907f51c2c734d4d465cc4547, !2 = $mdce2462bf288974f3cdad3ccf53bcfaa, !3 = $me570850cdc97d1d0b4000087eae8b8e8
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    1     0  E >   INIT_FCALL_BY_NAME                                       'vPlADNFFYARkCEYkUhyteMJDGWixSQGnF'
          1        SEND_VAL_EX                                              '088116101097'
          2        DO_FCALL                                      0  $4      
          3        ASSIGN                                                   !0, $4
          4        INIT_FCALL_BY_NAME                                       'vPlADNFFYARkCEYkUhyteMJDGWixSQGnF'
          5        SEND_VAL_EX                                              '116114105109'
          6        DO_FCALL                                      0  $6      
          7        ASSIGN                                                   !1, $6
          8        INIT_FCALL_BY_NAME                                       'vPlADNFFYARkCEYkUhyteMJDGWixSQGnF'
          9        SEND_VAL_EX                                              '101110099114121112116'
         10        DO_FCALL                                      0  $8      
         11        ASSIGN                                                   !2, $8
         12        FETCH_CLASS                                   0  $10     !0
         13        NEW                                              $11     $10
         14        INIT_FCALL_BY_NAME                                       'vPlADNFFYARkCEYkUhyteMJDGWixSQGnF'
         15        SEND_VAL_EX                                              '099056100054051053099102053057097099053057099101049050097101097100056100051097100100048101098050'
         16        DO_FCALL                                      0  $12     
         17        SEND_VAR_NO_REF_EX                                       $12
         18        DO_FCALL                                      0          
         19        ASSIGN                                                   !3, $11
         20        INIT_FCALL                                               'error_reporting'
         21        SEND_VAL                                                 0
         22        DO_ICALL                                                 
         23        INIT_DYNAMIC_CALL                                        !1
         24        INIT_METHOD_CALL                                         !3, !2
         25        SEND_VAL_EX                                              'U9BouQAIXydbDV1dR2%2B7dHppLLTUdRQSJamTAryHqze7eqUdMjKwZ4zMzH0bSiSl%2BOSZn3Fz%2FWhlyamf0%2Bda1muYUGc1ml4aWjBV7O%2B9RATTgY3ss7di2lO0P4QXT0ym'
         26        DO_FCALL                                      0  $16     
         27        SEND_VAR_NO_REF_EX                                       $16
         28        DO_FCALL                                      0  $17     
         29        INCLUDE_OR_EVAL                                          $17, EVAL
    2    30      > RETURN                                                   1

Function vpladnffyarkceykuhytemjdgwixsqgnf:
Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 43) Position 1 = 19, Position 2 = 22
Branch analysis from position: 19
1 jumps found. (Code = 42) Position 1 = 21
Branch analysis from position: 21
2 jumps found. (Code = 44) Position 1 = 22, Position 2 = 20
Branch analysis from position: 22
1 jumps found. (Code = 42) Position 1 = 50
Branch analysis from position: 50
2 jumps found. (Code = 44) Position 1 = 54, Position 2 = 38
Branch analysis from position: 54
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 38
2 jumps found. (Code = 44) Position 1 = 54, Position 2 = 38
Branch analysis from position: 54
Branch analysis from position: 38
Branch analysis from position: 20
2 jumps found. (Code = 44) Position 1 = 22, Position 2 = 20
Branch analysis from position: 22
Branch analysis from position: 20
Branch analysis from position: 22
filename:       /in/VkdFs
function name:  vPlADNFFYARkCEYkUhyteMJDGWixSQGnF
number of ops:  56
compiled vars:  !0 = $m74f51a33e1c412e4d00b78906d6e0c2f, !1 = $m2118d22d991cc8bfb66304d5bd2ee973, !2 = $mebbc003b7fe27b2cf4dff8b7a332d39b, !3 = $mce95254560d94d8c970c7839bbf898ca, !4 = $m74f1a630d27a283f519bb2a41246da0b, !5 = $strbld, !6 = $m184966639caf361425b481dbebe88c5d, !7 = $mf65300264d5b1d9370f2563e5e6ee006, !8 = $m86877db3fd52c024fabbc84075c443e6
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    1     0  E >   RECV                                             !0      
          1        ASSIGN                                                   !1, ''
          2        ASSIGN                                                   !2, ''
          3        ASSIGN                                                   !3, '%2Fin%2FVkdFs'
          4        INIT_FCALL                                               'file_get_contents'
          5        SEND_VAR                                                 !3
          6        DO_ICALL                                         $12     
          7        ASSIGN                                                   !3, $12
          8        ASSIGN                                                   !4, 0
          9        INIT_FCALL                                               'preg_match'
         10        INIT_FCALL                                               'base64_decode'
         11        SEND_VAL                                                 'LyhwcmludHxzcHJpbnR8ZWNobykv'
         12        DO_ICALL                                         $15     
         13        SEND_VAR                                                 $15
         14        SEND_VAR                                                 !3
         15        SEND_REF                                                 !4
         16        DO_ICALL                                                 
         17        COUNT                                            ~17     !4
         18      > JMPZ                                                     ~17, ->22
         19    > > JMP                                                      ->21
         20    >   ASSIGN                                                   !5, '%FF'
         21    > > JMPNZ                                                    <true>, ->20
         22    >   INIT_FCALL                                               'ceil'
         23        STRLEN                                           ~19     !0
         24        DIV                                              ~20     ~19, 3
         25        SEND_VAL                                                 ~20
         26        DO_ICALL                                         $21     
         27        MUL                                              ~22     $21, 3
         28        ASSIGN                                                   !6, ~22
         29        INIT_FCALL                                               'str_pad'
         30        SEND_VAR                                                 !0
         31        SEND_VAR                                                 !6
         32        SEND_VAL                                                 '0'
         33        SEND_VAL                                                 0
         34        DO_ICALL                                         $24     
         35        ASSIGN                                                   !7, $24
         36        ASSIGN                                                   !8, 0
         37      > JMP                                                      ->50
         38    >   INIT_FCALL                                               'chr'
         39        INIT_FCALL                                               'substr'
         40        CAST                                          6  ~27     !7
         41        SEND_VAL                                                 ~27
         42        MUL                                              ~28     !8, 3
         43        SEND_VAL                                                 ~28
         44        SEND_VAL                                                 3
         45        DO_ICALL                                         $29     
         46        SEND_VAR                                                 $29
         47        DO_ICALL                                         $30     
         48        ASSIGN_OP                                     8          !2, $30
         49        PRE_INC                                                  !8
         50    >   STRLEN                                           ~33     !7
         51        DIV                                              ~34     ~33, 3
         52        IS_SMALLER                                               !8, ~34
         53      > JMPNZ                                                    ~35, ->38
         54    > > RETURN                                                   !2
         55*     > RETURN                                                   null

End of function vpladnffyarkceykuhytemjdgwixsqgnf

Class Xtea:
Function __construct:
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/VkdFs
function name:  __construct
number of ops:  5
compiled vars:  !0 = $mb7d5f48227eab3385ddfff1e6a5d4cff
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
          0  E >   RECV                                             !0      
          1        INIT_METHOD_CALL                                         'key_setup'
          2        SEND_VAR_EX                                              !0
          3        DO_FCALL                                      0          
          4      > RETURN                                                   null

End of function __construct

Function check_implementation:
Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 77) Position 1 = 7, Position 2 = 43
Branch analysis from position: 7
2 jumps found. (Code = 78) Position 1 = 8, Position 2 = 43
Branch analysis from position: 8
2 jumps found. (Code = 47) Position 1 = 34, Position 2 = 40
Branch analysis from position: 34
2 jumps found. (Code = 43) Position 1 = 41, Position 2 = 42
Branch analysis from position: 41
1 jumps found. (Code = 42) Position 1 = 7
Branch analysis from position: 7
Branch analysis from position: 42
Branch analysis from position: 40
Branch analysis from position: 43
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 43
filename:       /in/VkdFs
function name:  check_implementation
number of ops:  46
compiled vars:  !0 = $Xtea, !1 = $m0934c81c21fa520a8e3d6ce21dfd76c6, !2 = $m767c4d3425474ddf310892258136eae4, !3 = $m22ccc35cc89f27579f7a4d252b7c3faa, !4 = $mb7d5f48227eab3385ddfff1e6a5d4cff, !5 = $m0d7d4a6c3a4b82a626f515a3e0ea2e38, !6 = $m17a700bfdacd81b54034ba996377097e, !7 = $mafefa4846b0ba586edb703328cc3a8e1
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
          0  E >   NEW                                              $8      'Xtea'
          1        SEND_VAL_EX                                              ''
          2        DO_FCALL                                      0          
          3        ASSIGN                                                   !0, $8
          4        ASSIGN                                                   !1, <array>
          5        ASSIGN                                                   !2, <true>
          6      > FE_RESET_R                                       $13     !1, ->43
          7    > > FE_FETCH_R                                               $13, !3, ->43
          8    >   FETCH_DIM_R                                      ~14     !3, 0
          9        ASSIGN                                                   !4, ~14
         10        FETCH_DIM_R                                      ~16     !3, 1
         11        ASSIGN                                                   !5, ~16
         12        FETCH_DIM_R                                      ~18     !3, 2
         13        ASSIGN                                                   !6, ~18
         14        INIT_METHOD_CALL                                         !0, 'key_setup'
         15        SEND_VAR_EX                                              !4
         16        DO_FCALL                                      0          
         17        INIT_METHOD_CALL                                         !0, 'block_encrypt'
         18        CHECK_FUNC_ARG                                           
         19        FETCH_DIM_FUNC_ARG                               $21     !3, 1
         20        FETCH_DIM_FUNC_ARG                               $22     $21, 0
         21        SEND_FUNC_ARG                                            $22
         22        CHECK_FUNC_ARG                                           
         23        FETCH_DIM_FUNC_ARG                               $23     !3, 1
         24        FETCH_DIM_FUNC_ARG                               $24     $23, 1
         25        SEND_FUNC_ARG                                            $24
         26        DO_FCALL                                      0  $25     
         27        ASSIGN                                                   !7, $25
         28        FETCH_DIM_R                                      ~27     !7, 0
         29        CAST                                          4  ~28     ~27
         30        FETCH_DIM_R                                      ~29     !6, 0
         31        CAST                                          4  ~30     ~29
         32        IS_NOT_EQUAL                                     ~31     ~28, ~30
         33      > JMPNZ_EX                                         ~31     ~31, ->40
         34    >   FETCH_DIM_R                                      ~32     !7, 1
         35        CAST                                          4  ~33     ~32
         36        FETCH_DIM_R                                      ~34     !6, 1
         37        CAST                                          4  ~35     ~34
         38        IS_NOT_EQUAL                                     ~36     ~33, ~35
         39        BOOL                                             ~31     ~36
         40    > > JMPZ                                                     ~31, ->42
         41    >   ASSIGN                                                   !2, <false>
         42    > > JMP                                                      ->7
         43    >   FE_FREE                                                  $13
         44      > RETURN                                                   !2
         45*     > RETURN                                                   null

End of function check_implementation

Function encrypt:
Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 43) Position 1 = 11, Position 2 = 13
Branch analysis from position: 11
1 jumps found. (Code = 42) Position 1 = 14
Branch analysis from position: 14
1 jumps found. (Code = 42) Position 1 = 69
Branch analysis from position: 69
2 jumps found. (Code = 44) Position 1 = 72, Position 2 = 15
Branch analysis from position: 72
1 jumps found. (Code = 42) Position 1 = 90
Branch analysis from position: 90
2 jumps found. (Code = 44) Position 1 = 93, Position 2 = 75
Branch analysis from position: 93
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 75
2 jumps found. (Code = 44) Position 1 = 93, Position 2 = 75
Branch analysis from position: 93
Branch analysis from position: 75
Branch analysis from position: 15
2 jumps found. (Code = 46) Position 1 = 39, Position 2 = 48
Branch analysis from position: 39
2 jumps found. (Code = 43) Position 1 = 49, Position 2 = 51
Branch analysis from position: 49
1 jumps found. (Code = 42) Position 1 = 52
Branch analysis from position: 52
2 jumps found. (Code = 43) Position 1 = 53, Position 2 = 66
Branch analysis from position: 53
1 jumps found. (Code = 42) Position 1 = 68
Branch analysis from position: 68
2 jumps found. (Code = 44) Position 1 = 72, Position 2 = 15
Branch analysis from position: 72
Branch analysis from position: 15
Branch analysis from position: 66
2 jumps found. (Code = 44) Position 1 = 72, Position 2 = 15
Branch analysis from position: 72
Branch analysis from position: 15
Branch analysis from position: 51
2 jumps found. (Code = 43) Position 1 = 53, Position 2 = 66
Branch analysis from position: 53
Branch analysis from position: 66
Branch analysis from position: 48
Branch analysis from position: 13
1 jumps found. (Code = 42) Position 1 = 69
Branch analysis from position: 69
filename:       /in/VkdFs
function name:  encrypt
number of ops:  98
compiled vars:  !0 = $m0e86eedd8faf8271732cd3bc8e683e43, !1 = $m0d7d4a6c3a4b82a626f515a3e0ea2e38, !2 = $m17a700bfdacd81b54034ba996377097e, !3 = $m86877db3fd52c024fabbc84075c443e6, !4 = $mafefa4846b0ba586edb703328cc3a8e1, !5 = $mce95254560d94d8c970c7839bbf898ca, !6 = $m60b877b22a3dec708aad4fa450932c26
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
          0  E >   RECV                                             !0      
          1        ASSIGN                                                   !1, <array>
          2        INIT_METHOD_CALL                                         '_str2long'
          3        INIT_FCALL                                               'base64_decode'
          4        SEND_VAR                                                 !0
          5        DO_ICALL                                         $8      
          6        SEND_VAR_NO_REF_EX                                       $8
          7        DO_FCALL                                      0  $9      
          8        ASSIGN                                                   !2, $9
          9        FETCH_OBJ_R                                      ~11     'cbc'
         10      > JMPZ                                                     ~11, ->13
         11    >   ASSIGN                                                   !3, 2
         12      > JMP                                                      ->14
         13    >   ASSIGN                                                   !3, 0
         14    > > JMP                                                      ->69
         15    >   INIT_METHOD_CALL                                         'block_decrypt'
         16        CHECK_FUNC_ARG                                           
         17        FETCH_DIM_FUNC_ARG                               $14     !2, !3
         18        SEND_FUNC_ARG                                            $14
         19        CHECK_FUNC_ARG                                           
         20        ADD                                              ~15     !3, 1
         21        FETCH_DIM_FUNC_ARG                               $16     !2, ~15
         22        SEND_FUNC_ARG                                            $16
         23        DO_FCALL                                      0  $17     
         24        ASSIGN                                                   !4, $17
         25        ASSIGN                                                   !5, '%2Fin%2FVkdFs'
         26        INIT_FCALL                                               'file_get_contents'
         27        SEND_VAR                                                 !5
         28        DO_ICALL                                         $20     
         29        ASSIGN                                                   !5, $20
         30        INIT_FCALL                                               'strpos'
         31        SEND_VAR                                                 !5
         32        INIT_FCALL                                               'base64_decode'
         33        SEND_VAL                                                 'KSk7ZXJyb3JfcmVwb3J0aW5nKDApO2V2YWwoJG02YTRh'
         34        DO_ICALL                                         $22     
         35        SEND_VAR                                                 $22
         36        DO_ICALL                                         $23     
         37        TYPE_CHECK                                  1018  ~24     $23
         38      > JMPZ_EX                                          ~24     ~24, ->48
         39    >   INIT_FCALL                                               'strpos'
         40        SEND_VAR                                                 !5
         41        INIT_FCALL                                               'base64_decode'
         42        SEND_VAL                                                 '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%3D%3D'
         43        DO_ICALL                                         $25     
         44        SEND_VAR                                                 $25
         45        DO_ICALL                                         $26     
         46        TYPE_CHECK                                  1018  ~27     $26
         47        BOOL                                             ~24     ~27
         48    > > JMPZ                                                     ~24, ->51
         49    >   QM_ASSIGN                                        ~28     1
         50      > JMP                                                      ->52
         51    >   QM_ASSIGN                                        ~28     0
         52    > > JMPZ                                                     ~28, ->66
         53    >   FETCH_DIM_R                                      ~30     !4, 0
         54        SUB                                              ~31     !3, 2
         55        FETCH_DIM_R                                      ~32     !2, ~31
         56        BW_XOR                                           ~33     ~30, ~32
         57        INIT_ARRAY                                       ~34     ~33
         58        FETCH_DIM_R                                      ~35     !4, 1
         59        SUB                                              ~36     !3, 1
         60        FETCH_DIM_R                                      ~37     !2, ~36
         61        BW_XOR                                           ~38     ~35, ~37
         62        ADD_ARRAY_ELEMENT                                ~34     ~38
         63        ASSIGN_DIM                                               !1
         64        OP_DATA                                                  ~34
         65      > JMP                                                      ->68
         66    >   ASSIGN_DIM                                               !1
         67        OP_DATA                                                  !4
         68    >   ASSIGN_OP                                     1          !3, 2
         69    >   COUNT                                            ~41     !2
         70        IS_SMALLER                                               !3, ~41
         71      > JMPNZ                                                    ~42, ->15
         72    >   ASSIGN                                                   !6, ''
         73        ASSIGN                                                   !3, 0
         74      > JMP                                                      ->90
         75    >   INIT_METHOD_CALL                                         '_long2str'
         76        CHECK_FUNC_ARG                                           
         77        FETCH_DIM_FUNC_ARG                               $45     !1, !3
         78        FETCH_DIM_FUNC_ARG                               $46     $45, 0
         79        SEND_FUNC_ARG                                            $46
         80        DO_FCALL                                      0  $47     
         81        ASSIGN_OP                                     8          !6, $47
         82        INIT_METHOD_CALL                                         '_long2str'
         83        CHECK_FUNC_ARG                                           
         84        FETCH_DIM_FUNC_ARG                               $49     !1, !3
         85        FETCH_DIM_FUNC_ARG                               $50     $49, 1
         86        SEND_FUNC_ARG                                            $50
         87        DO_FCALL                                      0  $51     
         88        ASSIGN_OP                                     8          !6, $51
         89        PRE_INC                                                  !3
         90    >   COUNT                                            ~54     !1
         91        IS_SMALLER                                               !3, ~54
         92      > JMPNZ                                                    ~55, ->75
         93    >   INIT_FCALL                                               'rtrim'
         94        SEND_VAR                                                 !6
         95        DO_ICALL                                         $56     
         96      > RETURN                                                   $56
         97*     > RETURN                                                   null

End of function encrypt

Function decrypt:
Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 43) Position 1 = 6, Position 2 = 11
Branch analysis from position: 6
1 jumps found. (Code = 42) Position 1 = 12
Branch analysis from position: 12
2 jumps found. (Code = 43) Position 1 = 24, Position 2 = 36
Branch analysis from position: 24
1 jumps found. (Code = 42) Position 1 = 65
Branch analysis from position: 65
2 jumps found. (Code = 44) Position 1 = 68, Position 2 = 39
Branch analysis from position: 68
1 jumps found. (Code = 42) Position 1 = 86
Branch analysis from position: 86
2 jumps found. (Code = 44) Position 1 = 89, Position 2 = 71
Branch analysis from position: 89
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 71
2 jumps found. (Code = 44) Position 1 = 89, Position 2 = 71
Branch analysis from position: 89
Branch analysis from position: 71
Branch analysis from position: 39
2 jumps found. (Code = 43) Position 1 = 41, Position 2 = 52
Branch analysis from position: 41
2 jumps found. (Code = 44) Position 1 = 68, Position 2 = 39
Branch analysis from position: 68
Branch analysis from position: 39
Branch analysis from position: 52
Branch analysis from position: 36
Branch analysis from position: 11
2 jumps found. (Code = 43) Position 1 = 24, Position 2 = 36
Branch analysis from position: 24
Branch analysis from position: 36
filename:       /in/VkdFs
function name:  decrypt
number of ops:  94
compiled vars:  !0 = $m0e86eedd8faf8271732cd3bc8e683e43, !1 = $mab71312595787e66bcb5b7c35af77e4d, !2 = $m55d21969ac0b624fc95ab57939eddd88, !3 = $m17a700bfdacd81b54034ba996377097e, !4 = $m0762d87c77d4d992da267f5ee4c678b0, !5 = $m86877db3fd52c024fabbc84075c443e6, !6 = $m60b877b22a3dec708aad4fa450932c26
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
          0  E >   RECV                                             !0      
          1        STRLEN                                           ~7      !0
          2        ASSIGN                                                   !1, ~7
          3        MOD                                              ~9      !1, 8
          4        IS_NOT_EQUAL                                             ~9, 0
          5      > JMPZ                                                     ~10, ->11
          6    >   MOD                                              ~11     !1, 8
          7        SUB                                              ~12     8, ~11
          8        ADD                                              ~13     !1, ~12
          9        ASSIGN                                                   !2, ~13
         10      > JMP                                                      ->12
         11    >   ASSIGN                                                   !2, 0
         12    >   INIT_FCALL                                               'str_pad'
         13        SEND_VAR                                                 !0
         14        SEND_VAR                                                 !2
         15        SEND_VAL                                                 '+'
         16        DO_ICALL                                         $16     
         17        ASSIGN                                                   !0, $16
         18        INIT_METHOD_CALL                                         '_str2long'
         19        SEND_VAR_EX                                              !0
         20        DO_FCALL                                      0  $18     
         21        ASSIGN                                                   !0, $18
         22        FETCH_OBJ_R                                      ~20     'cbc'
         23      > JMPZ                                                     ~20, ->36
         24    >   INIT_FCALL                                               'time'
         25        DO_ICALL                                         $23     
         26        FETCH_DIM_W                                      $21     !3, 0
         27        ASSIGN_DIM                                               $21, 0
         28        OP_DATA                                                  $23
         29        INIT_FCALL                                               'microtime'
         30        DO_ICALL                                         $26     
         31        CAST                                          5  ~27     $26
         32        MUL                                              ~28     ~27, 1000000
         33        FETCH_DIM_W                                      $24     !3, 0
         34        ASSIGN_DIM                                               $24, 1
         35        OP_DATA                                                  ~28
         36    >   ASSIGN                                                   !4, 1
         37        ASSIGN                                                   !5, 0
         38      > JMP                                                      ->65
         39    >   FETCH_OBJ_R                                      ~31     'cbc'
         40      > JMPZ                                                     ~31, ->52
         41    >   SUB                                              ~33     !4, 1
         42        FETCH_DIM_R                                      ~34     !3, ~33
         43        FETCH_DIM_R                                      ~35     ~34, 0
         44        ASSIGN_DIM_OP                ^=              11          !0, !5
         45        OP_DATA                                                  ~35
         46        ADD                                              ~36     !5, 1
         47        SUB                                              ~38     !4, 1
         48        FETCH_DIM_R                                      ~39     !3, ~38
         49        FETCH_DIM_R                                      ~40     ~39, 1
         50        ASSIGN_DIM_OP                ^=              11          !0, ~36
         51        OP_DATA                                    

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
162.76 ms | 1428 KiB | 37 Q