3v4l.org

run code in 300+ PHP versions simultaneously
<?php $foobar = 'yXXX24ZXXXyACJGi'; $strIn = "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"; $strIn = pack('H*', $strIn); $foo = mcrypt_decrypt(MCRYPT_RIJNDAEL_128, $foobar, $strIn, MCRYPT_MODE_CBC, $foobar); var_dump($foo);
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/lnWn7
function name:  (null)
number of ops:  21
compiled vars:  !0 = $foobar, !1 = $strIn, !2 = $foo
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    3     0  E >   ASSIGN                                                   !0, 'yXXX24ZXXXyACJGi'
    4     1        ASSIGN                                                   !1, '0fdd1b835ef40f85f56680d773b0a731d9cf8a326a30ca303f037dd86690bd34e51fc605870f5b17e8ee7bbbbea9cd9c14ebaa50d22c3a4c10565141d6531c6af82855f93872962a90d63ff34d985f98e735a0dbb8449e992bdfd13dcf4cc91014cd4752fcdfc998e260a16e8d7e3f8c6fe0e6b81a14b2c867a706093ed90ea2cca2af47f99bc24ec62024cfa92bf4f07e4155ee06b70f024902400cab479d605368b4af2104e522eb7c40c5c21287faeaabb693bd728af0c0738a56c94ab23f8f173d99834277569a5ede36de2578b69a737d93e1cec0c7d3fa6dc4e68ebc43ad8751cc73390682fc12af0ea66aa958f4d0eb82676296f996ec4db56a2a067fad79355949635755c5b3c466a8f8901a90cab34e1c8d2d1c7b043f435f4cc909ec11692e9eb6136ef4cc4582e79ef59db59b091f091eae6769f2d0541f5fcce9569e4cb8fc28672603727956bada7c2e38718d7118c42460d7efc16dc54263dae1e959bfa5182189075c7efbd14fa86d'
    5     2        INIT_FCALL                                               'pack'
          3        SEND_VAL                                                 'H%2A'
          4        SEND_VAR                                                 !1
          5        DO_ICALL                                         $5      
          6        ASSIGN                                                   !1, $5
    6     7        INIT_FCALL_BY_NAME                                       'mcrypt_decrypt'
          8        FETCH_CONSTANT                                   ~7      'MCRYPT_RIJNDAEL_128'
          9        SEND_VAL_EX                                              ~7
         10        SEND_VAR_EX                                              !0
         11        SEND_VAR_EX                                              !1
         12        FETCH_CONSTANT                                   ~8      'MCRYPT_MODE_CBC'
         13        SEND_VAL_EX                                              ~8
         14        SEND_VAR_EX                                              !0
         15        DO_FCALL                                      0  $9      
         16        ASSIGN                                                   !2, $9
    7    17        INIT_FCALL                                               'var_dump'
         18        SEND_VAR                                                 !2
         19        DO_ICALL                                                 
         20      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
160.26 ms | 1400 KiB | 17 Q