3v4l.org

run code in 300+ PHP versions simultaneously
<?php //echo openssl_cipher_iv_length('aes-256-gcm'); //echo $key = openssl_random_pseudo_bytes(16); die(); $secret="This is a secret message."; $key=pack("H*", "d8b163deda806acaede2f807"); //echo $iv=openssl_random_pseudo_bytes(12); $iv = "0e42519c0eda67c22c52b605ff41fde395880ebf6ed40a560b5f5ecc8183d26a"; $method="aes-256-gcm"; $encrypted = "95b52983e7dfb2bac4cc11ed84644656dc6266674d58edb1750dfb8e2adf13c7"; //$encrypted=openssl_encrypt($secret,$method,$key,false,$iv); $decrypted=openssl_decrypt($encrypted,$method,$key,false,$iv); echo $encrypted; echo "<br>"; echo $decrypted;
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 79) Position 1 = -2
filename:       /in/iREut
function name:  (null)
number of ops:  22
compiled vars:  !0 = $secret, !1 = $key, !2 = $iv, !3 = $method, !4 = $encrypted, !5 = $decrypted
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    5     0  E > > EXIT                                                     
    8     1*       ASSIGN                                                   !0, 'This+is+a+secret+message.'
    9     2*       INIT_FCALL                                               'pack'
          3*       SEND_VAL                                                 'H%2A'
          4*       SEND_VAL                                                 'd8b163deda806acaede2f807'
          5*       DO_ICALL                                         $7      
          6*       ASSIGN                                                   !1, $7
   11     7*       ASSIGN                                                   !2, '0e42519c0eda67c22c52b605ff41fde395880ebf6ed40a560b5f5ecc8183d26a'
   12     8*       ASSIGN                                                   !3, 'aes-256-gcm'
   13     9*       ASSIGN                                                   !4, '95b52983e7dfb2bac4cc11ed84644656dc6266674d58edb1750dfb8e2adf13c7'
   17    10*       INIT_FCALL_BY_NAME                                       'openssl_decrypt'
         11*       SEND_VAR_EX                                              !4
         12*       SEND_VAR_EX                                              !3
         13*       SEND_VAR_EX                                              !1
         14*       SEND_VAL_EX                                              <false>
         15*       SEND_VAR_EX                                              !2
         16*       DO_FCALL                                      0  $12     
         17*       ASSIGN                                                   !5, $12
   19    18*       ECHO                                                     !4
   20    19*       ECHO                                                     '%3Cbr%3E'
   21    20*       ECHO                                                     !5
         21*     > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
151.77 ms | 1395 KiB | 15 Q