Finding entry points Branch analysis from position: 0 1 jumps found. (Code = 42) Position 1 = 16 Branch analysis from position: 16 2 jumps found. (Code = 44) Position 1 = 18, Position 2 = 6 Branch analysis from position: 18 2 jumps found. (Code = 43) Position 1 = 19, Position 2 = 32 Branch analysis from position: 19 1 jumps found. (Code = 42) Position 1 = 30 Branch analysis from position: 30 2 jumps found. (Code = 44) Position 1 = 32, Position 2 = 21 Branch analysis from position: 32 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 21 2 jumps found. (Code = 44) Position 1 = 32, Position 2 = 21 Branch analysis from position: 32 Branch analysis from position: 21 Branch analysis from position: 32 Branch analysis from position: 6 2 jumps found. (Code = 44) Position 1 = 18, Position 2 = 6 Branch analysis from position: 18 Branch analysis from position: 6 filename: /in/phaRc function name: (null) number of ops: 33 compiled vars: !0 = $salt, !1 = $i line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 3 0 E > INIT_FCALL 'md5' 1 SEND_VAL 'static+salt' 2 DO_ICALL $2 3 ASSIGN !0, $2 5 4 ASSIGN !1, 0 5 > JMP ->16 6 6 > INIT_FCALL 'password_hash' 7 SEND_VAL 'reddit+is+fun' 8 SEND_VAL '2y' 9 INIT_ARRAY ~5 !0, 'salt' 10 ADD_ARRAY_ELEMENT ~5 4, 'cost' 11 SEND_VAL ~5 12 DO_ICALL $6 13 CONCAT ~7 $6, '%0A' 14 ECHO ~7 5 15 PRE_INC !1 16 > IS_SMALLER !1, 5 17 > JMPNZ ~9, ->6 9 18 > > JMPZ <true>, ->32 10 19 > ASSIGN !1, 0 20 > JMP ->30 11 21 > INIT_FCALL 'crypt' 22 SEND_VAL 'reddit+is+fun' 23 CONCAT ~11 '%242a%2404%24', !0 24 CONCAT ~12 ~11, '%24' 25 SEND_VAL ~12 26 DO_ICALL $13 27 CONCAT ~14 $13, '%0A' 28 ECHO ~14 10 29 PRE_INC !1 30 > IS_SMALLER !1, 5 31 > JMPNZ ~16, ->21 13 32 > > RETURN 1
Generated using Vulcan Logic Dumper, using php 8.0.0