3v4l.org

run code in 300+ PHP versions simultaneously
<?php $ecdsaString = '302e3630393738313034363635303330384f4b33373230383232313030393230313530393237333939643362303232356639306232393762633862626632323739653236343262626131636138663635623262316461653666303336316232326266313661373939'; $ecdsa = '3046022100a69b73db0e5db719df70eabb347aeb4cf997f636b7fa51e20285a6d7c67618fa02210097ba101dc093a1783752498f3189cf874535f79e32c0caa9b8d41b71f24c28e2'; $pubkey = '2d2d2d2d2d424547494e205055424c4943204b45592d2d2d2d2d0a4d466b77457759484b6f5a497a6a3043415159494b6f5a497a6a30444151634451674145617136646a797a6b70486458376b743844735374364975536f586a700a57566c4c666e5a506f4c61474b632f3242536659517546494f32686667756551494e4a4e335a64756a595866554a3757686f2b586b634a7148513d3d0a2d2d2d2d2d454e44205055424c4943204b45592d2d2d2d2d0a'; echo openssl_verify(hex2bin($ecdsaString), hex2bin($this->ecdsa), hex2bin($key), OPENSSL_ALGO_SHA256);
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/WBbm2
function name:  (null)
number of ops:  23
compiled vars:  !0 = $ecdsaString, !1 = $ecdsa, !2 = $pubkey, !3 = $key
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    3     0  E >   ASSIGN                                                   !0, '302e3630393738313034363635303330384f4b33373230383232313030393230313530393237333939643362303232356639306232393762633862626632323739653236343262626131636138663635623262316461653666303336316232326266313661373939'
    5     1        ASSIGN                                                   !1, '3046022100a69b73db0e5db719df70eabb347aeb4cf997f636b7fa51e20285a6d7c67618fa02210097ba101dc093a1783752498f3189cf874535f79e32c0caa9b8d41b71f24c28e2'
    7     2        ASSIGN                                                   !2, '2d2d2d2d2d424547494e205055424c4943204b45592d2d2d2d2d0a4d466b77457759484b6f5a497a6a3043415159494b6f5a497a6a30444151634451674145617136646a797a6b70486458376b743844735374364975536f586a700a57566c4c666e5a506f4c61474b632f3242536659517546494f32686667756551494e4a4e335a64756a595866554a3757686f2b586b634a7148513d3d0a2d2d2d2d2d454e44205055424c4943204b45592d2d2d2d2d0a'
    9     3        INIT_FCALL_BY_NAME                                       'openssl_verify'
          4        INIT_FCALL                                               'hex2bin'
          5        SEND_VAR                                                 !0
          6        DO_ICALL                                         $7      
          7        SEND_VAR_NO_REF_EX                                       $7
          8        INIT_FCALL                                               'hex2bin'
          9        FETCH_THIS                                       $8      
         10        FETCH_OBJ_R                                      ~9      $8, 'ecdsa'
         11        SEND_VAL                                                 ~9
         12        DO_ICALL                                         $10     
         13        SEND_VAR_NO_REF_EX                                       $10
         14        INIT_FCALL                                               'hex2bin'
         15        SEND_VAR                                                 !3
         16        DO_ICALL                                         $11     
         17        SEND_VAR_NO_REF_EX                                       $11
         18        FETCH_CONSTANT                                   ~12     'OPENSSL_ALGO_SHA256'
         19        SEND_VAL_EX                                              ~12
         20        DO_FCALL                                      0  $13     
         21        ECHO                                                     $13
         22      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
165.36 ms | 1395 KiB | 15 Q