Finding entry points Branch analysis from position: 0 1 jumps found. (Code = 62) Position 1 = -2 filename: /in/hq1HL function name: (null) number of ops: 64 compiled vars: none line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 13 0 E > INIT_FCALL 'var_dump' 1 INIT_STATIC_METHOD_CALL 'NewEra_IPv6Hack', 'ip_unpack' 2 INIT_STATIC_METHOD_CALL 'NewEra_IPv6Hack', 'ip_pack' 3 SEND_VAL_EX '%3A%3A' 4 DO_FCALL 0 $0 5 SEND_VAR_NO_REF_EX $0 6 DO_FCALL 0 $1 7 SEND_VAR $1 8 DO_ICALL 14 9 INIT_FCALL 'var_dump' 10 INIT_STATIC_METHOD_CALL 'NewEra_IPv6Hack', 'ip_unpack' 11 INIT_STATIC_METHOD_CALL 'NewEra_IPv6Hack', 'ip_pack' 12 SEND_VAL_EX '%3A%3A1' 13 DO_FCALL 0 $3 14 SEND_VAR_NO_REF_EX $3 15 DO_FCALL 0 $4 16 SEND_VAR $4 17 DO_ICALL 15 18 INIT_FCALL 'var_dump' 19 INIT_STATIC_METHOD_CALL 'NewEra_IPv6Hack', 'ip_unpack' 20 INIT_STATIC_METHOD_CALL 'NewEra_IPv6Hack', 'ip_pack' 21 SEND_VAL_EX '%3A%3Affff' 22 DO_FCALL 0 $6 23 SEND_VAR_NO_REF_EX $6 24 DO_FCALL 0 $7 25 SEND_VAR $7 26 DO_ICALL 16 27 INIT_FCALL 'var_dump' 28 INIT_STATIC_METHOD_CALL 'NewEra_IPv6Hack', 'ip_unpack' 29 INIT_STATIC_METHOD_CALL 'NewEra_IPv6Hack', 'ip_pack' 30 SEND_VAL_EX 'ffff%3A%3A1%3A0' 31 DO_FCALL 0 $9 32 SEND_VAR_NO_REF_EX $9 33 DO_FCALL 0 $10 34 SEND_VAR $10 35 DO_ICALL 17 36 INIT_FCALL 'var_dump' 37 INIT_STATIC_METHOD_CALL 'NewEra_IPv6Hack', 'ip_unpack' 38 INIT_STATIC_METHOD_CALL 'NewEra_IPv6Hack', 'ip_pack' 39 SEND_VAL_EX '1%3A%3Affff%3A0' 40 DO_FCALL 0 $12 41 SEND_VAR_NO_REF_EX $12 42 DO_FCALL 0 $13 43 SEND_VAR $13 44 DO_ICALL 18 45 INIT_FCALL 'var_dump' 46 INIT_STATIC_METHOD_CALL 'NewEra_IPv6Hack', 'ip_unpack' 47 INIT_STATIC_METHOD_CALL 'NewEra_IPv6Hack', 'ip_pack' 48 SEND_VAL_EX '%3A%3A2%3A3%3A4%3A5%3A6%3A7%3A8' 49 DO_FCALL 0 $15 50 SEND_VAR_NO_REF_EX $15 51 DO_FCALL 0 $16 52 SEND_VAR $16 53 DO_ICALL 19 54 INIT_FCALL 'var_dump' 55 INIT_STATIC_METHOD_CALL 'NewEra_IPv6Hack', 'ip_unpack' 56 INIT_STATIC_METHOD_CALL 'NewEra_IPv6Hack', 'ip_pack' 57 SEND_VAL_EX '2%3A3%3A4%3A5%3A6%3A7%3A8%3A%3A' 58 DO_FCALL 0 $18 59 SEND_VAR_NO_REF_EX $18 60 DO_FCALL 0 $19 61 SEND_VAR $19 62 DO_ICALL 191 63 > RETURN 1 Class NewEra_IPv6Hack: Function ip_pack: Finding entry points Branch analysis from position: 0 2 jumps found. (Code = 43) Position 1 = 7, Position 2 = 22 Branch analysis from position: 7 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 22 2 jumps found. (Code = 43) Position 1 = 28, Position 2 = 40 Branch analysis from position: 28 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 40 1 jumps found. (Code = 62) Position 1 = -2 filename: /in/hq1HL function name: ip_pack number of ops: 42 compiled vars: !0 = $ip line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 25 0 E > RECV !0 27 1 INIT_FCALL 'strpos' 2 SEND_VAR !0 3 SEND_VAL '.' 4 DO_ICALL $1 5 TYPE_CHECK 1018 $1 6 > JMPZ ~2, ->22 30 7 > INIT_FCALL 'trim' 8 SEND_VAR !0 9 SEND_VAL '%3Af' 10 DO_ICALL $3 11 ASSIGN !0, $3 31 12 INIT_FCALL 'pack' 13 SEND_VAL 'N' 14 INIT_FCALL 'ip2long' 15 SEND_VAR !0 16 DO_ICALL $5 17 SEND_VAR $5 18 DO_ICALL $6 19 ASSIGN !0, $6 33 20 > RETURN !0 21* JMP ->40 35 22 > INIT_FCALL 'strpos' 23 SEND_VAR !0 24 SEND_VAL '%3A' 25 DO_ICALL $8 26 TYPE_CHECK 1018 $8 27 > JMPZ ~9, ->40 38 28 > INIT_STATIC_METHOD_CALL 'ipv6_expand' 29 SEND_VAR_EX !0 30 DO_FCALL 0 $10 31 ASSIGN !0, $10 41 32 INIT_FCALL 'pack' 33 STRLEN ~12 !0 34 CONCAT ~13 'H', ~12 35 SEND_VAL ~13 36 SEND_VAR !0 37 DO_ICALL $14 38 ASSIGN !0, $14 43 39 > RETURN !0 46 40 > > RETURN <false> 47 41* > RETURN null End of function ip_pack Function ip_unpack: Finding entry points Branch analysis from position: 0 2 jumps found. (Code = 43) Position 1 = 4, Position 2 = 17 Branch analysis from position: 4 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 17 2 jumps found. (Code = 43) Position 1 = 20, Position 2 = 83 Branch analysis from position: 20 1 jumps found. (Code = 42) Position 1 = 80 Branch analysis from position: 80 2 jumps found. (Code = 44) Position 1 = 82, Position 2 = 28 Branch analysis from position: 82 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 28 2 jumps found. (Code = 43) Position 1 = 42, Position 2 = 51 Branch analysis from position: 42 2 jumps found. (Code = 43) Position 1 = 44, Position 2 = 46 Branch analysis from position: 44 1 jumps found. (Code = 42) Position 1 = 47 Branch analysis from position: 47 1 jumps found. (Code = 42) Position 1 = 78 Branch analysis from position: 78 2 jumps found. (Code = 44) Position 1 = 82, Position 2 = 28 Branch analysis from position: 82 Branch analysis from position: 28 Branch analysis from position: 46 1 jumps found. (Code = 42) Position 1 = 78 Branch analysis from position: 78 Branch analysis from position: 51 2 jumps found. (Code = 46) Position 1 = 57, Position 2 = 59 Branch analysis from position: 57 2 jumps found. (Code = 43) Position 1 = 60, Position 2 = 70 Branch analysis from position: 60 2 jumps found. (Code = 46) Position 1 = 62, Position 2 = 65 Branch analysis from position: 62 2 jumps found. (Code = 43) Position 1 = 66, Position 2 = 67 Branch analysis from position: 66 1 jumps found. (Code = 42) Position 1 = 78 Branch analysis from position: 78 Branch analysis from position: 67 1 jumps found. (Code = 42) Position 1 = 78 Branch analysis from position: 78 Branch analysis from position: 65 Branch analysis from position: 70 2 jumps found. (Code = 43) Position 1 = 72, Position 2 = 74 Branch analysis from position: 72 1 jumps found. (Code = 42) Position 1 = 75 Branch analysis from position: 75 2 jumps found. (Code = 44) Position 1 = 82, Position 2 = 28 Branch analysis from position: 82 Branch analysis from position: 28 Branch analysis from position: 74 2 jumps found. (Code = 44) Position 1 = 82, Position 2 = 28 Branch analysis from position: 82 Branch analysis from position: 28 Branch analysis from position: 59 Branch analysis from position: 83 1 jumps found. (Code = 62) Position 1 = -2 filename: /in/hq1HL function name: ip_unpack number of ops: 85 compiled vars: !0 = $ip, !1 = $res, !2 = $i, !3 = $seg line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 50 0 E > RECV !0 52 1 STRLEN ~4 !0 2 IS_EQUAL ~4, 4 3 > JMPZ ~5, ->17 55 4 > INIT_FCALL 'unpack' 5 SEND_VAL 'N' 6 SEND_VAR !0 7 DO_ICALL $6 8 FETCH_LIST_R $7 $6, 1 9 ASSIGN !0, $7 10 FREE $6 56 11 INIT_FCALL 'long2ip' 12 SEND_VAR !0 13 DO_ICALL $9 14 ASSIGN !0, $9 58 15 > RETURN !0 16* JMP ->83 60 17 > STRLEN ~11 !0 18 IS_EQUAL ~11, 16 19 > JMPZ ~12, ->83 63 20 > INIT_FCALL 'bin2hex' 21 SEND_VAR !0 22 DO_ICALL $13 23 ASSIGN !0, $13 66 24 ASSIGN !1, '' 67 25 STRLEN ~16 !0 26 ASSIGN !2, ~16 27 > JMP ->80 69 28 > INIT_FCALL 'substr' 29 SEND_VAR !0 30 SUB ~18 !2, 4 31 SEND_VAL ~18 32 SEND_VAL 4 33 DO_ICALL $19 34 ASSIGN !3, $19 70 35 INIT_FCALL 'ltrim' 36 SEND_VAR !3 37 SEND_VAL '0' 38 DO_ICALL $21 39 ASSIGN !3, $21 72 40 IS_NOT_EQUAL !3, '' 41 > JMPZ ~23, ->51 74 42 > IS_EQUAL !1, '' 43 > JMPZ ~24, ->46 44 > QM_ASSIGN ~25 '' 45 > JMP ->47 46 > QM_ASSIGN ~25 '%3A' 47 > CONCAT ~26 !3, ~25 48 CONCAT ~27 ~26, !1 49 ASSIGN !1, ~27 50 > JMP ->78 79 51 > INIT_FCALL 'strpos' 52 SEND_VAR !1 53 SEND_VAL '%3A%3A' 54 DO_ICALL $29 55 TYPE_CHECK 4 ~30 $29 56 > JMPZ_EX ~30 ~30, ->59 57 > IS_SMALLER ~31 4, !2 58 BOOL ~30 ~31 59 > > JMPZ ~30, ->70 81 60 > IS_NOT_EQUAL ~32 !1, '' 61 > JMPZ_EX ~32 ~32, ->65 62 > FETCH_DIM_R ~33 !1, 0 63 IS_EQUAL ~34 ~33, '%3A' 64 BOOL ~32 ~34 65 > > JMPZ ~32, ->67 83 66 > > JMP ->78 85 67 > CONCAT ~35 '%3A', !1 68 ASSIGN !1, ~35 86 69 > JMP ->78 88 70 > IS_EQUAL !1, '' 71 > JMPZ ~37, ->74 72 > QM_ASSIGN ~38 '' 73 > JMP ->75 74 > QM_ASSIGN ~38 '%3A' 75 > CONCAT ~39 '0', ~38 76 CONCAT ~40 ~39, !1 77 ASSIGN !1, ~40 67 78 > SUB ~42 !2, 4 79 ASSIGN !2, ~42 80 > IS_SMALLER 0, !2 81 > JMPNZ ~44, ->28 98 82 > > RETURN !1 101 83 > > RETURN <false> 102 84* > RETURN null End of function ip_unpack Function ipv6_expand: Finding entry points Branch analysis from position: 0 2 jumps found. (Code = 77) Position 1 = 9, Position 2 = 35 Branch analysis from position: 9 2 jumps found. (Code = 78) Position 1 = 10, Position 2 = 35 Branch analysis from position: 10 2 jumps found. (Code = 46) Position 1 = 12, Position 2 = 13 Branch analysis from position: 12 2 jumps found. (Code = 43) Position 1 = 14, Position 2 = 27 Branch analysis from position: 14 1 jumps found. (Code = 42) Position 1 = 34 Branch analysis from position: 34 1 jumps found. (Code = 42) Position 1 = 9 Branch analysis from position: 9 Branch analysis from position: 27 1 jumps found. (Code = 42) Position 1 = 9 Branch analysis from position: 9 Branch analysis from position: 13 Branch analysis from position: 35 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 35 filename: /in/hq1HL function name: ipv6_expand number of ops: 38 compiled vars: !0 = $ip, !1 = $res, !2 = $expand, !3 = $seg line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 105 0 E > RECV !0 107 1 INIT_FCALL 'explode' 2 SEND_VAL '%3A' 3 SEND_VAR !0 4 DO_ICALL $4 5 ASSIGN !0, $4 108 6 ASSIGN !1, '' 109 7 ASSIGN !2, <true> 110 8 > FE_RESET_R $8 !0, ->35 9 > > FE_FETCH_R $8, !3, ->35 112 10 > IS_EQUAL ~9 !3, '' 11 > JMPZ_EX ~9 ~9, ->13 12 > BOOL ~9 !2 13 > > JMPZ ~9, ->27 115 14 > INIT_FCALL 'str_pad' 15 SEND_VAL '' 16 COUNT ~10 !0 17 SUB ~11 8, ~10 18 ADD ~12 ~11, 1 19 MUL ~13 ~12, 4 20 SEND_VAL ~13 21 SEND_VAL '0' 22 SEND_VAL 0 23 DO_ICALL $14 24 ASSIGN_OP 8 !1, $14 118 25 ASSIGN !2, <false> 26 > JMP ->34 123 27 > INIT_FCALL 'str_pad' 28 SEND_VAR !3 29 SEND_VAL 4 30 SEND_VAL '0' 31 SEND_VAL 0 32 DO_ICALL $17 33 ASSIGN_OP 8 !1, $17 110 34 > > JMP ->9 35 > FE_FREE $8 127 36 > RETURN !1 128 37* > RETURN null End of function ipv6_expand Function ipv6_shift_right: Finding entry points Branch analysis from position: 0 1 jumps found. (Code = 62) Position 1 = -2 filename: /in/hq1HL function name: ipv6_shift_right number of ops: 29 compiled vars: !0 = $ip line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 131 0 E > RECV !0 133 1 INIT_STATIC_METHOD_CALL 'ipv6_expand' 2 SEND_VAR !0 3 DO_FCALL 0 $1 4 ASSIGN !0, $1 134 5 INIT_FCALL 'substr' 6 SEND_VAR !0 7 SEND_VAL -1 8 DO_ICALL $3 9 INIT_FCALL 'substr' 10 SEND_VAR !0 11 SEND_VAL 0 12 SEND_VAL -1 13 DO_ICALL $4 14 CONCAT ~5 $3, $4 15 ASSIGN !0, ~5 135 16 INIT_FCALL 'substr' 17 INIT_FCALL 'chunk_split' 18 SEND_VAR !0 19 SEND_VAL 4 20 SEND_VAL '%3A' 21 DO_ICALL $7 22 SEND_VAR $7 23 SEND_VAL 0 24 SEND_VAL -1 25 DO_ICALL $8 26 ASSIGN !0, $8 137 27 > RETURN !0 138 28* > RETURN null End of function ipv6_shift_right Function ipv6_to_ipv4: Finding entry points Branch analysis from position: 0 2 jumps found. (Code = 47) Position 1 = 7, Position 2 = 13 Branch analysis from position: 7 2 jumps found. (Code = 43) Position 1 = 14, Position 2 = 15 Branch analysis from position: 14 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 15 1 jumps found. (Code = 42) Position 1 = 49 Branch analysis from position: 49 2 jumps found. (Code = 44) Position 1 = 51, Position 2 = 34 Branch analysis from position: 51 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 34 2 jumps found. (Code = 44) Position 1 = 51, Position 2 = 34 Branch analysis from position: 51 Branch analysis from position: 34 Branch analysis from position: 13 filename: /in/hq1HL function name: ipv6_to_ipv4 number of ops: 56 compiled vars: !0 = $ip, !1 = $ipv4, !2 = $i line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 141 0 E > RECV !0 143 1 INIT_FCALL 'strpos' 2 SEND_VAR !0 3 SEND_VAL '%3A' 4 DO_ICALL $3 5 TYPE_CHECK 4 ~4 $3 6 > JMPNZ_EX ~4 ~4, ->13 7 > INIT_FCALL 'strpos' 8 SEND_VAR !0 9 SEND_VAL '.' 10 DO_ICALL $5 11 TYPE_CHECK 1018 ~6 $5 12 BOOL ~4 ~6 13 > > JMPZ ~4, ->15 145 14 > > RETURN <false> 148 15 > INIT_STATIC_METHOD_CALL 'ipv6_shift_right' 16 SEND_VAR !0 17 DO_FCALL 0 $7 18 ASSIGN !0, $7 149 19 INIT_STATIC_METHOD_CALL 'ip_pack' 20 SEND_VAR !0 21 DO_FCALL 0 $9 22 ASSIGN !0, $9 155 23 INIT_FCALL 'chr' 24 INIT_FCALL 'ord' 25 FETCH_DIM_R ~11 !0, 0 26 SEND_VAL ~11 27 DO_ICALL $12 28 BW_OR ~13 $12, 240 29 SEND_VAL ~13 30 DO_ICALL $14 31 ASSIGN !1, $14 157 32 ASSIGN !2, 1 33 > JMP ->49 160 34 > INIT_FCALL 'chr' 35 INIT_FCALL 'ord' 36 FETCH_DIM_R ~17 !0, !2 37 SEND_VAL ~17 38 DO_ICALL $18 39 INIT_FCALL 'ord' 40 ADD ~19 !2, 1 41 FETCH_DIM_R ~20 !0, ~19 42 SEND_VAL ~20 43 DO_ICALL $21 44 BW_XOR ~22 $18, $21 45 SEND_VAL ~22 46 DO_ICALL $23 47 ASSIGN_OP 8 !1, $23 157 48 ASSIGN_OP 1 !2, 2 49 > IS_SMALLER !2, 7 50 > JMPNZ ~26, ->34 163 51 > INIT_STATIC_METHOD_CALL 'ip_unpack' 52 SEND_VAR !1 53 DO_FCALL 0 $27 54 > RETURN $27 164 55* > RETURN null End of function ipv6_to_ipv4 Function v4overv6_to_ipv4: Finding entry points Branch analysis from position: 0 2 jumps found. (Code = 43) Position 1 = 7, Position 2 = 13 Branch analysis from position: 7 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 13 1 jumps found. (Code = 62) Position 1 = -2 filename
Generated using Vulcan Logic Dumper, using php 8.0.0