Finding entry points Branch analysis from position: 0 2 jumps found. (Code = 77) Position 1 = 4, Position 2 = 19 Branch analysis from position: 4 2 jumps found. (Code = 78) Position 1 = 5, Position 2 = 19 Branch analysis from position: 5 2 jumps found. (Code = 43) Position 1 = 11, Position 2 = 16 Branch analysis from position: 11 1 jumps found. (Code = 42) Position 1 = 18 Branch analysis from position: 18 1 jumps found. (Code = 42) Position 1 = 4 Branch analysis from position: 4 Branch analysis from position: 16 1 jumps found. (Code = 42) Position 1 = 4 Branch analysis from position: 4 Branch analysis from position: 19 2 jumps found. (Code = 43) Position 1 = 22, Position 2 = 24 Branch analysis from position: 22 1 jumps found. (Code = 42) Position 1 = 25 Branch analysis from position: 25 2 jumps found. (Code = 77) Position 1 = 28, Position 2 = 37 Branch analysis from position: 28 2 jumps found. (Code = 78) Position 1 = 29, Position 2 = 37 Branch analysis from position: 29 2 jumps found. (Code = 43) Position 1 = 35, Position 2 = 36 Branch analysis from position: 35 1 jumps found. (Code = 42) Position 1 = 28 Branch analysis from position: 28 Branch analysis from position: 36 Branch analysis from position: 37 2 jumps found. (Code = 43) Position 1 = 40, Position 2 = 42 Branch analysis from position: 40 1 jumps found. (Code = 42) Position 1 = 43 Branch analysis from position: 43 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 42 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 37 Branch analysis from position: 24 2 jumps found. (Code = 77) Position 1 = 28, Position 2 = 37 Branch analysis from position: 28 Branch analysis from position: 37 Branch analysis from position: 19 filename: /in/Yidr1 function name: (null) number of ops: 44 compiled vars: !0 = $spamWords, !1 = $spamMessage, !2 = $spam, !3 = $spamWord line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 3 0 E > ASSIGN !0, <array> 5 1 ASSIGN !1, 'Here+we+go+blah+blah+blah' 8 2 ASSIGN !2, 0 9 3 > FE_RESET_R $7 !0, ->19 4 > > FE_FETCH_R $7, !3, ->19 10 5 > INIT_FCALL 'strpos' 6 SEND_VAR !1 7 SEND_VAR !3 8 DO_ICALL $8 9 TYPE_CHECK 4 $8 10 > JMPZ ~9, ->16 11 11 > CONCAT ~10 'This+keyword+aint+here%2C+previous+value+-+', !2 12 CONCAT ~11 ~10, '%0A' 13 ECHO ~11 12 14 ASSIGN !2, 0 10 15 > JMP ->18 14 16 > PRE_INC !2 15 17 ECHO 'I+am+spam%0A' 9 18 > > JMP ->4 19 > FE_FREE $7 19 20 IS_IDENTICAL !2, 0 21 > JMPZ ~14, ->24 20 22 > ECHO 'not+spam%0A' 19 23 > JMP ->25 22 24 > ECHO 'spam%0A' 26 25 > ECHO 'Right+approach%0A' 27 26 ASSIGN !2, 0 28 27 > FE_RESET_R $16 !0, ->37 28 > > FE_FETCH_R $16, !3, ->37 29 29 > INIT_FCALL 'strpos' 30 SEND_VAR !1 31 SEND_VAR !3 32 DO_ICALL $17 33 TYPE_CHECK 1018 $17 34 > JMPZ ~18, ->36 30 35 > PRE_INC !2 28 36 > > JMP ->28 37 > FE_FREE $16 34 38 IS_IDENTICAL !2, 0 39 > JMPZ ~20, ->42 35 40 > ECHO 'not+spam' 34 41 > JMP ->43 37 42 > ECHO 'spam' 38 43 > > RETURN 1
Generated using Vulcan Logic Dumper, using php 8.0.0