Finding entry points Branch analysis from position: 0 1 jumps found. (Code = 42) Position 1 = 20 Branch analysis from position: 20 2 jumps found. (Code = 44) Position 1 = 22, Position 2 = 9 Branch analysis from position: 22 2 jumps found. (Code = 43) Position 1 = 23, Position 2 = 37 Branch analysis from position: 23 1 jumps found. (Code = 42) Position 1 = 35 Branch analysis from position: 35 2 jumps found. (Code = 44) Position 1 = 37, Position 2 = 25 Branch analysis from position: 37 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 25 2 jumps found. (Code = 44) Position 1 = 37, Position 2 = 25 Branch analysis from position: 37 Branch analysis from position: 25 Branch analysis from position: 37 Branch analysis from position: 9 2 jumps found. (Code = 44) Position 1 = 22, Position 2 = 9 Branch analysis from position: 22 Branch analysis from position: 9 filename: /in/p1JmO function name: (null) number of ops: 38 compiled vars: !0 = $salt, !1 = $i line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 3 0 E > INIT_FCALL 'md5' 1 SEND_VAL 'static+salt' 2 DO_ICALL $2 3 ASSIGN !0, $2 5 4 CONCAT ~4 'SALT%3A+', !0 5 CONCAT ~5 ~4, '%0A' 6 ECHO ~5 7 7 ASSIGN !1, 0 8 > JMP ->20 8 9 > INIT_FCALL 'password_hash' 10 SEND_VAL 'reddit+is+fun' 11 SEND_VAL '2y' 12 INIT_ARRAY ~7 !0, 'salt' 13 ADD_ARRAY_ELEMENT ~7 4, 'cost' 14 SEND_VAL ~7 15 DO_ICALL $8 16 CONCAT ~9 'PASSWORD+HASH%3A+', $8 17 CONCAT ~10 ~9, '%0A' 18 ECHO ~10 7 19 PRE_INC !1 20 > IS_SMALLER !1, 5 21 > JMPNZ ~12, ->9 11 22 > > JMPZ <true>, ->37 12 23 > ASSIGN !1, 0 24 > JMP ->35 13 25 > INIT_FCALL 'crypt' 26 SEND_VAL 'reddit+is+fun' 27 CONCAT ~14 '%242a%2404%24', !0 28 CONCAT ~15 ~14, '%24' 29 SEND_VAL ~15 30 DO_ICALL $16 31 CONCAT ~17 'CRYPT+BLOWFISH%3A+', $16 32 CONCAT ~18 ~17, '%0A' 33 ECHO ~18 12 34 PRE_INC !1 35 > IS_SMALLER !1, 5 36 > JMPNZ ~20, ->25 15 37 > > RETURN 1
Generated using Vulcan Logic Dumper, using php 8.0.0