Finding entry points Branch analysis from position: 0 2 jumps found. (Code = 43) Position 1 = 21, Position 2 = 23 Branch analysis from position: 21 1 jumps found. (Code = 42) Position 1 = 24 Branch analysis from position: 24 2 jumps found. (Code = 43) Position 1 = 32, Position 2 = 34 Branch analysis from position: 32 1 jumps found. (Code = 42) Position 1 = 35 Branch analysis from position: 35 2 jumps found. (Code = 43) Position 1 = 53, Position 2 = 55 Branch analysis from position: 53 1 jumps found. (Code = 42) Position 1 = 56 Branch analysis from position: 56 2 jumps found. (Code = 43) Position 1 = 64, Position 2 = 66 Branch analysis from position: 64 1 jumps found. (Code = 42) Position 1 = 67 Branch analysis from position: 67 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 66 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 55 2 jumps found. (Code = 43) Position 1 = 64, Position 2 = 66 Branch analysis from position: 64 Branch analysis from position: 66 Branch analysis from position: 34 2 jumps found. (Code = 43) Position 1 = 53, Position 2 = 55 Branch analysis from position: 53 Branch analysis from position: 55 Branch analysis from position: 23 2 jumps found. (Code = 43) Position 1 = 32, Position 2 = 34 Branch analysis from position: 32 Branch analysis from position: 34 filename: /in/b3Plj function name: (null) number of ops: 68 compiled vars: !0 = $userId, !1 = $short_username, !2 = $long_username, !3 = $password, !4 = $combined, !5 = $hash, !6 = $bad_combination line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 3 0 E > ASSIGN !0, '7788990011223344551' 4 1 ASSIGN !1, 'zerocool95' 5 2 ASSIGN !2, 'zerocool95-Y3Jhc2ggb3ZlcnJpZGUgaXMgcmVhbGx5IHplcm8gY29vbA' 6 3 ASSIGN !3, 'Mess+with+the+best%2C+die+like+the+rest.' 8 4 ECHO 'Using+short+username%0A' 9 5 CONCAT ~11 !0, !1 6 CONCAT ~12 ~11, !3 7 ASSIGN !4, ~12 11 8 INIT_FCALL 'password_hash' 12 9 SEND_VAR !4 13 10 SEND_VAL '2y' 15 11 SEND_VAL <array> 11 12 DO_ICALL $14 13 ASSIGN !5, $14 19 14 CONCAT ~16 !5, '%0A' 15 ECHO ~16 21 16 INIT_FCALL 'password_verify' 17 SEND_VAR !4 18 SEND_VAR !5 19 DO_ICALL $17 20 > JMPZ $17, ->23 22 21 > ECHO 'Correct+user+id%2C+username%2C+password+combination%0A' 21 22 > JMP ->24 24 23 > ECHO 'Incorrect+combination%0A' 27 24 > CONCAT ~18 !0, !1 25 CONCAT ~19 ~18, 'not-my-password' 26 ASSIGN !6, ~19 28 27 INIT_FCALL 'password_verify' 28 SEND_VAR !6 29 SEND_VAR !5 30 DO_ICALL $21 31 > JMPZ $21, ->34 29 32 > ECHO 'Correct+user+id%2C+username%2C+password+combination%0A' 28 33 > JMP ->35 31 34 > ECHO 'Incorrect+combination%0A' 40 35 > ECHO '%0A---%0A' 44 36 ECHO 'Using+LONG+short+username%0A' 45 37 CONCAT ~22 !0, !2 38 CONCAT ~23 ~22, !3 39 ASSIGN !4, ~23 47 40 INIT_FCALL 'password_hash' 48 41 SEND_VAR !4 49 42 SEND_VAL '2y' 51 43 SEND_VAL <array> 47 44 DO_ICALL $25 45 ASSIGN !5, $25 55 46 CONCAT ~27 !5, '%0A' 47 ECHO ~27 57 48 INIT_FCALL 'password_verify' 49 SEND_VAR !4 50 SEND_VAR !5 51 DO_ICALL $28 52 > JMPZ $28, ->55 58 53 > ECHO 'Correct+user+id%2C+username%2C+password+combination%0A' 57 54 > JMP ->56 60 55 > ECHO 'Incorrect+combination%0A' 63 56 > CONCAT ~29 !0, !2 57 CONCAT ~30 ~29, 'not-my-password' 58 ASSIGN !6, ~30 64 59 INIT_FCALL 'password_verify' 60 SEND_VAR !6 61 SEND_VAR !5 62 DO_ICALL $32 63 > JMPZ $32, ->66 65 64 > ECHO 'Correct+user+id%2C+username%2C+password+combination%0A' 64 65 > JMP ->67 67 66 > ECHO 'Incorrect+combination%0A' 73 67 > > RETURN 1
Generated using Vulcan Logic Dumper, using php 8.0.0