3v4l.org

run code in 300+ PHP versions simultaneously
<?php class SiteController extends Controller { /** * Declares class-based actions. */ public function actions() { return array( // captcha action renders the CAPTCHA image displayed on the contact page 'captcha' => array( 'class' => 'CCaptchaAction', 'backColor' => 0xFFFFFF, ), // page action renders "static" pages stored under 'protected/views/site/pages' // They can be accessed via: index.php?r=site/page&view=FileName 'page' => array( 'class' => 'CViewAction', ), ); } /** * This is the default 'index' action that is invoked * when an action is not explicitly requested by users. */ public function actionIndex() { if (Utility::isSessionValid()) { $session = new CHttpSession; $session->open(); $rid = $session['Person_ID']; $csaServices2 = array(); $bdims_reg_tags = explode(",", BDIMS_REGISTRAR_TAGS); //Check If the use if CSA / VLE if (Utility::isAuthorizedCsa($rid)) { $csaServices = Utility::getCsaServices(); foreach ($csaServices as $key => $values) { foreach ($values as $k => $val) { $val = (array) $val; if (($val['is_csa_service'] == "2") && Utility::isAuthorizedVle($rid)) { if ($val['service_provider_tag'] == 'bdims') { if (!in_array($val['service_tag'], $bdims_reg_tags)) { $csaServices2[$key][$k] = $val; } } else { $csaServices2[$key][$k] = $val; } } elseif ($val['is_csa_service'] == "1") { if ($val['service_provider_tag'] == 'bdims') { if (!in_array($val['service_tag'], $bdims_reg_tags)) { $csaServices2[$key][$k] = $val; } } else { $csaServices2[$key][$k] = $val; } } } } } else { //Check If the user is BDIMS User $userInfo = Utility::getHealthUserInfo($rid); if ($userInfo != "1" && $userInfo != "2") { //Check for other Auth users throw new CHttpException(403, 'Access Denied. Please contact IVISS Administator.'); exit; } else { $csaServices = Utility::getCsaServices(); $bdims_info = Utility::getHealthUserInfo($rid); if (($bdims_info != "1") && ($bdims_info != "2")) { throw new CHttpException(403, 'Access Denied. Please contact IVISS Administator.'); exit; } foreach ($csaServices as $key => $values) { foreach ($values as $k => $val) { $val = (array) $val; if ($val['service_provider_tag'] == 'bdims') { if (($bdims_info == "2") && in_array($val['service_tag'], $bdims_reg_tags)) { $csaServices2[$key][$k] = $val; } elseif (($bdims_info == "1") && !in_array($val['service_tag'], $bdims_reg_tags)) { $csaServices2[$key][$k] = $val; } } } } } } $session['csaServices'] = $csaServices2; unset($csaServices); unset($csaServices2); //$this->render('index', array('csaServices' => $csaServices2)); $htmlCode = $this->render('index', true); $htmlCode = preg_replace('#(?ix)(?>[^\S ]\s*|\s{2,})(?=(?:(?:[^<]++|<(?!/?(?:textarea|pre)\b))*+)(?:<(?>textarea|pre)\b|\z))#', ' ', $htmlCode); echo $htmlCode; } else { $loginUrl = Utility::getFullBaseUrl() . "/site/login"; $this->redirect($loginUrl); } } /** * This is the action to handle external exceptions. */ public function actionError() { if ($error = Yii::app()->errorHandler->error) { if (Yii::app()->request->isAjaxRequest) echo $error['message']; else $this->render('error', $error); } } /** * Validates the Token * * @return boolean */ public function actionIstokenactive() { $session = new CHttpSession; $session->open(); if (empty($session['idm_token'])) { echo "0"; } else { $idm_token = $session['idm_token']; $info = Utility::getTokenInfo($idm_token); echo count($info); } } /** * Displays the contact page */ public function actionContact() { throw new CHttpException(405, 'Method Discontinued. Please contact IVISS Administator.'); exit; $model = new ContactForm; if (isset($_POST['ContactForm'])) { $model->attributes = $_POST['ContactForm']; if ($model->validate()) { $name = '=?UTF-8?B?' . base64_encode($model->name) . '?='; $subject = '=?UTF-8?B?' . base64_encode($model->subject) . '?='; $headers = "From: $name <{$model->email}>\r\n" . "Reply-To: {$model->email}\r\n" . "MIME-Version: 1.0\r\n" . "Content-Type: text/plain; charset=UTF-8"; mail(Yii::app()->params['adminEmail'], $subject, $model->body, $headers); Yii::app()->user->setFlash('contact', 'Thank you for contacting us. We will respond to you as soon as possible.'); $this->refresh(); } } $this->render('contact', array('model' => $model)); } /** * Displays the login page */ public function actionLogin() { if (Utility::isSessionValid()) { $loginUrl = Utility::getFullBaseUrl(); $this->redirect($loginUrl); exit; } if (isset($_POST['idm_token'])) { $idm_token = $_POST['idm_token']; $tokenInfo = Utility::getTokenInfo($idm_token); if (!isset($tokenInfo['Person_ID']) || empty($tokenInfo['Person_ID'])) { //Exception throw new CHttpException(400, 'Invalid Request.'); } $rid = $tokenInfo['Person_ID']; $csaInfo = Utility::getCsaInfo($rid); if (($csaInfo === false) && (Utility::isAuthorizedVle($rid) === false) && (Utility::isHealthUser($rid) === false)) { //Exception throw new CHttpException(403, 'Access Denied'); } else { $session = new CHttpSession; $session->open(); $session['Person_ID'] = $rid; //$session['username'] = Utility::outputfilter(Utility::sanatizeParams($tokenInfo['Person'])); $session['username'] = Utility::sanatizeParams($tokenInfo['Person']); $session['idm_token'] = $idm_token; $session->regenerateID(); } Utility::initLogin(); $this->redirect($this->createUrl('/')); } else { $service_provider_tag = "csaportal"; $HMAC_KEY = Utility::getHmacKeyFromLegitTag($service_provider_tag); if ($HMAC_KEY === false) { //Exception throw new CHttpException(500, 'No HMAC Key Found'); } else { $actionUrl = Utility::getUrlFromLegitTag('ldapserver'); $actionUrl = $actionUrl . "/auth/idmlevel2/"; $actionUrl = Utility::removeDoubleSlashesFromUrl($actionUrl); $callback_url = Utility::getUrlFromLegitTag($service_provider_tag); $callback_url = $callback_url . "/site/login"; $callback_failure_url = $callback_url; $idm_data = ($callback_url . $callback_failure_url . $service_provider_tag); $IDM_HMAC = hash_hmac('sha1', $idm_data, $HMAC_KEY); $params = array(); $params['action_url'] = $actionUrl; $params['callback_url'] = $callback_url; $params['callback_failure_url'] = $callback_failure_url; $params['service_provider_tag'] = "csaportal"; $params['idm_hmac'] = $IDM_HMAC; // display the login form //$htmlCode = $this->renderPartial('idmlogin', $params, true); $htmlCode = $this->renderPartial('loginidm', $params, true); $htmlCode = preg_replace('#(?ix)(?>[^\S ]\s*|\s{2,})(?=(?:(?:[^<]++|<(?!/?(?:textarea|pre)\b))*+)(?:<(?>textarea|pre)\b|\z))#', ' ', $htmlCode); echo $htmlCode; } } } /** * Logs out the current user and redirect to homepage. */ public function actionLogout() { Yii::app()->user->logout(); $session = new CHttpSession; $session->destroy(); unset(Yii::app()->request->cookies['ZDEDebuggerPresent']); unset(Yii::app()->request->cookies['YII_CSRF_TOKEN']); unset(Yii::app()->request->cookies['PHPSESSID']); unset(Yii::app()->request->cookies['iviss_cookie']); $loginUrl = Utility::getFullBaseUrl() . "/site/login"; $this->redirect($loginUrl); } }
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/XSb5Q
function name:  (null)
number of ops:  2
compiled vars:  none
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    3     0  E >   DECLARE_CLASS                                            'sitecontroller', 'controller'
  236     1      > RETURN                                                   1

Class SiteController:
Function actions:
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/XSb5Q
function name:  actions
number of ops:  2
compiled vars:  none
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
   12     0  E > > RETURN                                                   <array>
   21     1*     > RETURN                                                   null

End of function actions

Function actionindex:
Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 43) Position 1 = 3, Position 2 = 175
Branch analysis from position: 3
2 jumps found. (Code = 43) Position 1 = 21, Position 2 = 83
Branch analysis from position: 21
2 jumps found. (Code = 77) Position 1 = 25, Position 2 = 81
Branch analysis from position: 25
2 jumps found. (Code = 78) Position 1 = 26, Position 2 = 81
Branch analysis from position: 26
2 jumps found. (Code = 77) Position 1 = 28, Position 2 = 79
Branch analysis from position: 28
2 jumps found. (Code = 78) Position 1 = 29, Position 2 = 79
Branch analysis from position: 29
2 jumps found. (Code = 46) Position 1 = 35, Position 2 = 39
Branch analysis from position: 35
2 jumps found. (Code = 43) Position 1 = 40, Position 2 = 58
Branch analysis from position: 40
2 jumps found. (Code = 43) Position 1 = 43, Position 2 = 54
Branch analysis from position: 43
2 jumps found. (Code = 43) Position 1 = 50, Position 2 = 53
Branch analysis from position: 50
1 jumps found. (Code = 42) Position 1 = 57
Branch analysis from position: 57
1 jumps found. (Code = 42) Position 1 = 78
Branch analysis from position: 78
1 jumps found. (Code = 42) Position 1 = 28
Branch analysis from position: 28
Branch analysis from position: 53
Branch analysis from position: 54
1 jumps found. (Code = 42) Position 1 = 78
Branch analysis from position: 78
Branch analysis from position: 58
2 jumps found. (Code = 43) Position 1 = 61, Position 2 = 78
Branch analysis from position: 61
2 jumps found. (Code = 43) Position 1 = 64, Position 2 = 75
Branch analysis from position: 64
2 jumps found. (Code = 43) Position 1 = 71, Position 2 = 74
Branch analysis from position: 71
1 jumps found. (Code = 42) Position 1 = 78
Branch analysis from position: 78
Branch analysis from position: 74
Branch analysis from position: 75
1 jumps found. (Code = 42) Position 1 = 28
Branch analysis from position: 28
Branch analysis from position: 78
Branch analysis from position: 39
Branch analysis from position: 79
1 jumps found. (Code = 42) Position 1 = 25
Branch analysis from position: 25
Branch analysis from position: 79
Branch analysis from position: 81
1 jumps found. (Code = 42) Position 1 = 158
Branch analysis from position: 158
1 jumps found. (Code = 42) Position 1 = 182
Branch analysis from position: 182
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 81
Branch analysis from position: 83
2 jumps found. (Code = 46) Position 1 = 89, Position 2 = 91
Branch analysis from position: 89
2 jumps found. (Code = 43) Position 1 = 92, Position 2 = 99
Branch analysis from position: 92
1 jumps found. (Code = 108) Position 1 = -2
Branch analysis from position: 99
2 jumps found. (Code = 46) Position 1 = 108, Position 2 = 110
Branch analysis from position: 108
2 jumps found. (Code = 43) Position 1 = 111, Position 2 = 117
Branch analysis from position: 111
1 jumps found. (Code = 108) Position 1 = -2
Branch analysis from position: 117
2 jumps found. (Code = 77) Position 1 = 118, Position 2 = 157
Branch analysis from position: 118
2 jumps found. (Code = 78) Position 1 = 119, Position 2 = 157
Branch analysis from position: 119
2 jumps found. (Code = 77) Position 1 = 121, Position 2 = 155
Branch analysis from position: 121
2 jumps found. (Code = 78) Position 1 = 122, Position 2 = 155
Branch analysis from position: 122
2 jumps found. (Code = 43) Position 1 = 128, Position 2 = 154
Branch analysis from position: 128
2 jumps found. (Code = 46) Position 1 = 130, Position 2 = 136
Branch analysis from position: 130
2 jumps found. (Code = 43) Position 1 = 137, Position 2 = 141
Branch analysis from position: 137
1 jumps found. (Code = 42) Position 1 = 154
Branch analysis from position: 154
1 jumps found. (Code = 42) Position 1 = 121
Branch analysis from position: 121
Branch analysis from position: 141
2 jumps found. (Code = 46) Position 1 = 143, Position 2 = 150
Branch analysis from position: 143
2 jumps found. (Code = 43) Position 1 = 151, Position 2 = 154
Branch analysis from position: 151
1 jumps found. (Code = 42) Position 1 = 121
Branch analysis from position: 121
Branch analysis from position: 154
Branch analysis from position: 150
Branch analysis from position: 136
Branch analysis from position: 154
Branch analysis from position: 155
1 jumps found. (Code = 42) Position 1 = 118
Branch analysis from position: 118
Branch analysis from position: 155
Branch analysis from position: 157
1 jumps found. (Code = 42) Position 1 = 182
Branch analysis from position: 182
Branch analysis from position: 157
Branch analysis from position: 110
Branch analysis from position: 91
Branch analysis from position: 175
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/XSb5Q
function name:  actionIndex
number of ops:  183
compiled vars:  !0 = $session, !1 = $rid, !2 = $csaServices2, !3 = $bdims_reg_tags, !4 = $csaServices, !5 = $values, !6 = $key, !7 = $val, !8 = $k, !9 = $userInfo, !10 = $bdims_info, !11 = $htmlCode, !12 = $loginUrl
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
   28     0  E >   INIT_STATIC_METHOD_CALL                                  'Utility', 'isSessionValid'
          1        DO_FCALL                                      0  $13     
          2      > JMPZ                                                     $13, ->175
   29     3    >   NEW                                              $14     'CHttpSession'
          4        DO_FCALL                                      0          
          5        ASSIGN                                                   !0, $14
   30     6        INIT_METHOD_CALL                                         !0, 'open'
          7        DO_FCALL                                      0          
   31     8        FETCH_DIM_R                                      ~18     !0, 'Person_ID'
          9        ASSIGN                                                   !1, ~18
   32    10        ASSIGN                                                   !2, <array>
   33    11        INIT_FCALL                                               'explode'
         12        SEND_VAL                                                 '%2C'
         13        FETCH_CONSTANT                                   ~21     'BDIMS_REGISTRAR_TAGS'
         14        SEND_VAL                                                 ~21
         15        DO_ICALL                                         $22     
         16        ASSIGN                                                   !3, $22
   36    17        INIT_STATIC_METHOD_CALL                                  'Utility', 'isAuthorizedCsa'
         18        SEND_VAR_EX                                              !1
         19        DO_FCALL                                      0  $24     
         20      > JMPZ                                                     $24, ->83
   37    21    >   INIT_STATIC_METHOD_CALL                                  'Utility', 'getCsaServices'
         22        DO_FCALL                                      0  $25     
         23        ASSIGN                                                   !4, $25
   38    24      > FE_RESET_R                                       $27     !4, ->81
         25    > > FE_FETCH_R                                       ~28     $27, !5, ->81
         26    >   ASSIGN                                                   !6, ~28
   39    27      > FE_RESET_R                                       $30     !5, ->79
         28    > > FE_FETCH_R                                       ~31     $30, !7, ->79
         29    >   ASSIGN                                                   !8, ~31
   40    30        CAST                                          7  ~33     !7
         31        ASSIGN                                                   !7, ~33
   41    32        FETCH_DIM_R                                      ~35     !7, 'is_csa_service'
         33        IS_EQUAL                                         ~36     ~35, '2'
         34      > JMPZ_EX                                          ~36     ~36, ->39
         35    >   INIT_STATIC_METHOD_CALL                                  'Utility', 'isAuthorizedVle'
         36        SEND_VAR_EX                                              !1
         37        DO_FCALL                                      0  $37     
         38        BOOL                                             ~36     $37
         39    > > JMPZ                                                     ~36, ->58
   42    40    >   FETCH_DIM_R                                      ~38     !7, 'service_provider_tag'
         41        IS_EQUAL                                                 ~38, 'bdims'
         42      > JMPZ                                                     ~39, ->54
   43    43    >   INIT_FCALL                                               'in_array'
         44        FETCH_DIM_R                                      ~40     !7, 'service_tag'
         45        SEND_VAL                                                 ~40
         46        SEND_VAR                                                 !3
         47        DO_ICALL                                         $41     
         48        BOOL_NOT                                         ~42     $41
         49      > JMPZ                                                     ~42, ->53
   44    50    >   FETCH_DIM_W                                      $43     !2, !6
         51        ASSIGN_DIM                                               $43, !8
         52        OP_DATA                                                  !7
         53    > > JMP                                                      ->57
   47    54    >   FETCH_DIM_W                                      $45     !2, !6
         55        ASSIGN_DIM                                               $45, !8
         56        OP_DATA                                                  !7
         57    > > JMP                                                      ->78
   49    58    >   FETCH_DIM_R                                      ~47     !7, 'is_csa_service'
         59        IS_EQUAL                                                 ~47, '1'
         60      > JMPZ                                                     ~48, ->78
   50    61    >   FETCH_DIM_R                                      ~49     !7, 'service_provider_tag'
         62        IS_EQUAL                                                 ~49, 'bdims'
         63      > JMPZ                                                     ~50, ->75
   51    64    >   INIT_FCALL                                               'in_array'
         65        FETCH_DIM_R                                      ~51     !7, 'service_tag'
         66        SEND_VAL                                                 ~51
         67        SEND_VAR                                                 !3
         68        DO_ICALL                                         $52     
         69        BOOL_NOT                                         ~53     $52
         70      > JMPZ                                                     ~53, ->74
   52    71    >   FETCH_DIM_W                                      $54     !2, !6
         72        ASSIGN_DIM                                               $54, !8
         73        OP_DATA                                                  !7
         74    > > JMP                                                      ->78
   55    75    >   FETCH_DIM_W                                      $56     !2, !6
         76        ASSIGN_DIM                                               $56, !8
         77        OP_DATA                                                  !7
   39    78    > > JMP                                                      ->28
         79    >   FE_FREE                                                  $30
   38    80      > JMP                                                      ->25
         81    >   FE_FREE                                                  $27
         82      > JMP                                                      ->158
   62    83    >   INIT_STATIC_METHOD_CALL                                  'Utility', 'getHealthUserInfo'
         84        SEND_VAR_EX                                              !1
         85        DO_FCALL                                      0  $58     
         86        ASSIGN                                                   !9, $58
   63    87        IS_NOT_EQUAL                                     ~60     !9, '1'
         88      > JMPZ_EX                                          ~60     ~60, ->91
         89    >   IS_NOT_EQUAL                                     ~61     !9, '2'
         90        BOOL                                             ~60     ~61
         91    > > JMPZ                                                     ~60, ->99
   65    92    >   NEW                                              $62     'CHttpException'
         93        SEND_VAL_EX                                              403
         94        SEND_VAL_EX                                              'Access+Denied.+Please+contact+IVISS+Administator.'
         95        DO_FCALL                                      0          
         96      > THROW                                         0          $62
   66    97*       EXIT                                                     
         98*       JMP                                                      ->158
   68    99    >   INIT_STATIC_METHOD_CALL                                  'Utility', 'getCsaServices'
        100        DO_FCALL                                      0  $64     
        101        ASSIGN                                                   !4, $64
   69   102        INIT_STATIC_METHOD_CALL                                  'Utility', 'getHealthUserInfo'
        103        SEND_VAR_EX                                              !1
        104        DO_FCALL                                      0  $66     
        105        ASSIGN                                                   !10, $66
   70   106        IS_NOT_EQUAL                                     ~68     !10, '1'
        107      > JMPZ_EX                                          ~68     ~68, ->110
        108    >   IS_NOT_EQUAL                                     ~69     !10, '2'
        109        BOOL                                             ~68     ~69
        110    > > JMPZ                                                     ~68, ->117
   71   111    >   NEW                                              $70     'CHttpException'
        112        SEND_VAL_EX                                              403
        113        SEND_VAL_EX                                              'Access+Denied.+Please+contact+IVISS+Administator.'
        114        DO_FCALL                                      0          
        115      > THROW                                         0          $70
   72   116*       EXIT                                                     
   74   117    > > FE_RESET_R                                       $72     !4, ->157
        118    > > FE_FETCH_R                                       ~73     $72, !5, ->157
        119    >   ASSIGN                                                   !6, ~73
   75   120      > FE_RESET_R                                       $75     !5, ->155
        121    > > FE_FETCH_R                                       ~76     $75, !7, ->155
        122    >   ASSIGN                                                   !8, ~76
   76   123        CAST                                          7  ~78     !7
        124        ASSIGN                                                   !7, ~78
   77   125        FETCH_DIM_R                                      ~80     !7, 'service_provider_tag'
        126        IS_EQUAL                                                 ~80, 'bdims'
        127      > JMPZ                                                     ~81, ->154
   78   128    >   IS_EQUAL                                         ~82     !10, '2'
        129      > JMPZ_EX                                          ~82     ~82, ->136
        130    >   INIT_FCALL                                               'in_array'
        131        FETCH_DIM_R                                      ~83     !7, 'service_tag'
        132        SEND_VAL                                                 ~83
        133        SEND_VAR                                                 !3
        134        DO_ICALL                                         $84     
        135        BOOL                                             ~82     $84
        136    > > JMPZ                                                     ~82, ->141
   79   137    >   FETCH_DIM_W                                      $85     !2, !6
        138        ASSIGN_DIM                                               $85, !8
        139        OP_DATA                                                  !7
        140      > JMP                                                      ->154
   80   141    >   IS_EQUAL                                         ~87     !10, '1'
        142      > JMPZ_EX                                          ~87     ~87, ->150
        143    >   INIT_FCALL                                               'in_array'
        144        FETCH_DIM_R                                      ~88     !7, 'service_tag'
        145        SEND_VAL                                                 ~88
        146        SEND_VAR                                                 !3
        147        DO_ICALL                                         $89     
        148        BOOL_NOT                                         ~90     $89
        149        BOOL                                             ~87     ~90
        150    > > JMPZ                                                     ~87, ->154
   81   151    >   FETCH_DIM_W                                      $91     !2, !6
        152        ASSIGN_DIM                                               $91, !8
        153        OP_DATA                                                  !7
   75   154    > > JMP                                                      ->121
        155    >   FE_FREE                                                  $75
   74   156      > JMP                                                      ->118
        157    >   FE_FREE                                                  $72
   88   158    >   ASSIGN_DIM                                               !0, 'csaServices'
        159        OP_DATA                                                  !2
   89   160        UNSET_CV                                                 !4
   90   161        UNSET_CV                                                 !2
   92   162        INIT_METHOD_CALL                                         'render'
        163        SEND_VAL_EX                                              'index'
        164        SEND_VAL_EX                                              <true>
        165        DO_FCALL                                      0  $94     
        166        ASSIGN                                                   !11, $94
   93   167        INIT_FCALL                                               'preg_replace'
        168        SEND_VAL                                                 '%23%28%3Fix%29%28%3F%3E%5B%5E%5CS+%5D%5Cs%2A%7C%5Cs%7B2%2C%7D%29%28%3F%3D%28%3F%3A%28%3F%3A%5B%5E%3C%5D%2B%2B%7C%3C%28%3F%21%2F%3F%28%3F%3Atextarea%7Cpre%29%5Cb%29%29%2A%2B%29%28%3F%3A%3C%28%3F%3Etextarea%7Cpre%29%5Cb%7C%5Cz%29%29%23'
        169        SEND_VAL                                                 '+'
        170        SEND_VAR                                                 !11
        171        DO_ICALL                                         $96     
        172        ASSIGN                                                   !11, $96
   94   173        ECHO                                                     !11
        174      > JMP                                                      ->182
   96   175    >   INIT_STATIC_METHOD_CALL                                  'Utility', 'getFullBaseUrl'
        176        DO_FCALL                                      0  $98     
        177        CONCAT                                           ~99     $98, '%2Fsite%2Flogin'
        178        ASSIGN                                                   !12, ~99
   97   179        INIT_METHOD_CALL                                         'redirect'
        180        SEND_VAR_EX                                              !12
        181        DO_FCALL                                      0          
   99   182    > > RETURN                                                   null

End of function actionindex

Function actionerror:
Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 43) Position 1 = 6, Position 2 = 18
Branch analysis from position: 6
2 jumps found. (Code = 43) Position 1 = 11, Position 2 = 14
Branch analysis from position: 11
1 jumps found. (Code = 42) Position 1 = 18
Branch analysis from position: 18
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 14
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 18
filename:       /in/XSb5Q
function name:  actionError
number of ops:  19
compiled vars:  !0 = $error
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
  105     0  E >   INIT_STATIC_METHOD_CALL                                  'Yii', 'app'
          1        DO_FCALL                                      0  $1      
          2        FETCH_OBJ_R                                      ~2      $1, 'errorHandler'
          3        FETCH_OBJ_R                                      ~3      ~2, 'error'
          4        ASSIGN                                           ~4      !0, ~3
          5      > JMPZ                                                     ~4, ->18
  106     6    >   INIT_STATIC_METHOD_CALL                                  'Yii', 'app'
          7        DO_FCALL                                      0  $5      
          8        FETCH_OBJ_R                                      ~6      $5, 'request'
          9        FETCH_OBJ_R                                      ~7      ~6, 'isAjaxRequest'
         10      > JMPZ                                                     ~7, ->14
  107    11    >   FETCH_DIM_R                                      ~8      !0, 'message'
         12        ECHO                                                     ~8
         13      > JMP                                                      ->18
  109    14    >   INIT_METHOD_CALL                                         'render'
         15        SEND_VAL_EX                                              'error'
         16        SEND_VAR_EX                                              !0
         17        DO_FCALL                                      0          
  111    18    > > RETURN                                                   null

End of function actionerror

Function actionistokenactive:
Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 43) Position 1 = 7, Position 2 = 9
Branch analysis from position: 7
1 jumps found. (Code = 42) Position 1 = 17
Branch analysis from position: 17
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 9
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/XSb5Q
function name:  actionIstokenactive
number of ops:  18
compiled vars:  !0 = $session, !1 = $idm_token, !2 = $info
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
  119     0  E >   NEW                                              $3      'CHttpSession'
          1        DO_FCALL                                      0          
          2        ASSIGN                                                   !0, $3
  120     3        INIT_METHOD_CALL                                         !0, 'open'
          4        DO_FCALL                                      0          
  121     5        ISSET_ISEMPTY_DIM_OBJ                         1          !0, 'idm_token'
          6      > JMPZ                                                     ~7, ->9
  122     7    >   ECHO                                                     '0'
          8      > JMP                                                      ->17
  124     9    >   FETCH_DIM_R                                      ~8      !0, 'idm_token'
         10        ASSIGN                                                   !1, ~8
  125    11        INIT_STATIC_METHOD_CALL                                  'Utility', 'getTokenInfo'
         12        SEND_VAR_EX                                              !1
         13        DO_FCALL                                      0  $10     
         14        ASSIGN                                                   !2, $10
  126    15        COUNT                                            ~12     !2
         16        ECHO                                                     ~12
  128    17    > > RETURN                                                   null

End of function actionistokenactive

Function actioncontact:
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 108) Position 1 = -2
filename:       /in/XSb5Q
function name:  actionContact
number of ops:  73
compiled vars:  !0 = $model, !1 = $name, !2 = $subject, !3 = $headers
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
  134     0  E >   NEW                                              $4      'CHttpException'
          1        SEND_VAL_EX                                              405
          2        SEND_VAL_EX                                              'Method+Discontinued.+Please+contact+IVISS+Administator.'
          3        DO_FCALL                                      0          
          4      > THROW                                         0          $4
  135     5*       EXIT                                                     
  137     6*       NEW                                              $6      'ContactForm'
          7*       DO_FCALL                                      0          
          8*       ASSIGN                                                   !0, $6
  138     9*       FETCH_IS                                         ~9      '_POST'
         10*       ISSET_ISEMPTY_DIM_OBJ                         0          ~9, 'ContactForm'
         11*       JMPZ                                                     ~10, ->67
  139    12*       FETCH_R                      global              ~12     '_POST'
         13*       FETCH_DIM_R                                      ~13     ~12, 'ContactForm'
         14*       ASSIGN_OBJ                                               !0, 'attributes'
         15*       OP_DATA                                                  ~13
  140    16*       INIT_METHOD_CALL                                         !0, 'validate'
         17*       DO_FCALL                                      0  $14     
         18*       JMPZ                                                     $14, ->67
  141    19*       INIT_FCALL                                               'base64_encode'
         20*       FETCH_OBJ_R                                      ~15     !0, 'name'
         21*       SEND_VAL                                                 ~15
         22*       DO_ICALL                                         $16     
         23*       CONCAT                                           ~17     '%3D%3FUTF-8%3FB%3F', $16
         24*       CONCAT                                           ~18     ~17, '%3F%3D'
         25*       ASSIGN                                                   !1, ~18
  142    26*       INIT_FCALL                                               'base64_encode'
         27*       FETCH_OBJ_R                                      ~20     !0, 'subject'
         28*       SEND_VAL                                                 ~20
         29*       DO_ICALL                                         $21     
         30*       CONCAT                                           ~22     '%3D%3FUTF-8%3FB%3F', $21
         31*       CONCAT                                           ~23     ~22, '%3F%3D'
         32*       ASSIGN                                                   !2, ~23
  143    33*       ROPE_INIT                                     5  ~27     'From%3A+'
         34*       ROPE_ADD                                      1  ~27     ~27, !1
         35*       ROPE_ADD                                      2  ~27     ~27, '+%3C'
         36*       FETCH_OBJ_R                                      ~25     !0, 'email'
         37*       ROPE_ADD                                      3  ~27     ~27, ~25
         38*       ROPE_END                                      4  ~26     ~27, '%3E%0D%0A'
  144    39*       ROPE_INIT                                     3  ~32     'Reply-To%3A+'
         40*       FETCH_OBJ_R                                      ~30     !0, 'email'
         41*       ROPE_ADD                                      1  ~32     ~32, ~30
         42*       ROPE_END                                      2  ~31     ~32, '%0D%0A'
         43*       CONCAT                                           ~34     ~26, ~31
  145    44*       CONCAT                                           ~35     ~34, 'MIME-Version%3A+1.0%0D%0A'
  146    45*       CONCAT                                           ~36     ~35, 'Content-Type%3A+text%2Fplain%3B+charset%3DUTF-8'
  143    46*       ASSIGN                                                   !3, ~36
  148    47*       INIT_FCALL                                               'mail'
         48*       INIT_STATIC_METHOD_CALL                                  'Yii', 'app'
         49*       DO_FCALL                                      0  $38     
         50*       FETCH_OBJ_R                                      ~39     $38, 'params'
         51*       FETCH_DIM_R                                      ~40     ~39, 'adminEmail'
         52*       SEND_VAL                                                 ~40
         53*       SEND_VAR                                                 !2
         54*       FETCH_OBJ_R                                      ~41     !0, 'body'
         55*       SEND_VAL                                                 ~41
         56*       SEND_VAR                                                 !3
         57*       DO_ICALL                                                 
  149    58*       INIT_STATIC_METHOD_CALL                                  'Yii', 'app'
         59*       DO_FCALL                                      0  $43     
         60*       FETCH_OBJ_R                                      ~44     $43, 'user'
         61*       INIT_METHOD_CALL                                         ~44, 'setFlash'
         62*       SEND_VAL_EX                                              'contact'
         63*       SEND_VAL_EX                                    

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
157.95 ms | 1428 KiB | 23 Q