Finding entry points Branch analysis from position: 0 1 jumps found. (Code = 62) Position 1 = -2 filename: /in/kJmEn function name: (null) number of ops: 43 compiled vars: none line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 2 0 E > INIT_FCALL 'crypt' 1 SEND_VAL 'rasmuslerdorf' 2 SEND_VAL 'rl' 3 DO_ICALL $0 4 CONCAT ~1 'Standard+DES%3A+', $0 5 CONCAT ~2 ~1, '%0A' 6 ECHO ~2 3 7 INIT_FCALL 'crypt' 8 SEND_VAL 'rasmuslerdorf' 9 SEND_VAL '_J9..rasm' 10 DO_ICALL $3 11 CONCAT ~4 'Extended+DES%3A+', $3 12 CONCAT ~5 ~4, '%0A' 13 ECHO ~5 4 14 INIT_FCALL 'crypt' 15 SEND_VAL 'rasmuslerdorf' 16 SEND_VAL '%241%24rasmusle%24' 17 DO_ICALL $6 18 CONCAT ~7 'MD5%3A++++++++++', $6 19 CONCAT ~8 ~7, '%0A' 20 ECHO ~8 5 21 INIT_FCALL 'crypt' 22 SEND_VAL 'rasmuslerdorf' 23 SEND_VAL '%242a%2407%24usesomesillystringforsalt%24' 24 DO_ICALL $9 25 CONCAT ~10 'Blowfish%3A+++++', $9 26 CONCAT ~11 ~10, '%0A' 27 ECHO ~11 6 28 INIT_FCALL 'crypt' 29 SEND_VAL 'rasmuslerdorf' 30 SEND_VAL '%245%24rounds%3D5000%24usesomesillystringforsalt%24' 31 DO_ICALL $12 32 CONCAT ~13 'SHA-256%3A++++++', $12 33 CONCAT ~14 ~13, '%0A' 34 ECHO ~14 7 35 INIT_FCALL 'crypt' 36 SEND_VAL 'rasmuslerdorf' 37 SEND_VAL '%246%24rounds%3D5000%24usesomesillystringforsalt%24' 38 DO_ICALL $15 39 CONCAT ~16 'SHA-512%3A++++++', $15 40 CONCAT ~17 ~16, '%0A' 41 ECHO ~17 42 > RETURN 1
Generated using Vulcan Logic Dumper, using php 8.0.0