Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename: /in/soqne
function name: (null)
number of ops: 56
compiled vars: !0 = $json, !1 = $data
line #* E I O op fetch ext return operands
-------------------------------------------------------------------------------------
13 0 E > ASSIGN !0, '%7B%0A++++%22name%22%3A%7B%0A+++++++++%22first_name%22%3A%22James%22%2C%0A+++++++++%22last_name%22%3A%22Bond%22%0A+++++%7D%2C%0A+++++%22aliases%22%3A%5B%22007%22%2C%22Bond%22%5D%2C%0A+++++%22profiles%22%3A%5B%7B%220%22%3A%22unknown%22%7D%2C%22007%22%2C%7B%222%22%3A%22secret+agent%22%7D%5D%0A%7D'
22 1 INIT_FCALL 'json_decode'
2 SEND_VAR !0
3 SEND_VAL <true>
4 DO_ICALL $3
5 ASSIGN !1, $3
23 6 INIT_FCALL 'implode'
7 SEND_VAL '%0A'
8 INIT_FCALL 'pathify'
9 SEND_VAR !1
10 SEND_VAL '%2FBond1'
11 DO_FCALL 0 $5
12 SEND_VAR $5
13 DO_ICALL $6
14 ECHO $6
24 15 ECHO '%0A-------%0A'
25 16 INIT_FCALL 'implode'
17 SEND_VAL '%0A'
18 INIT_FCALL 'pathify'
19 SEND_VAL <array>
20 SEND_VAL '%2FBond2'
21 DO_FCALL 0 $7
22 SEND_VAR $7
23 DO_ICALL $8
24 ECHO $8
26 25 ECHO '%0A-------%0A'
27 26 INIT_FCALL 'implode'
27 SEND_VAL '%0A'
28 INIT_FCALL 'pathify'
29 SEND_VAL <array>
30 SEND_VAL '%2FBond3'
31 DO_FCALL 0 $9
32 SEND_VAR $9
33 DO_ICALL $10
34 ECHO $10
28 35 ECHO '%0A-------%0A'
29 36 INIT_FCALL 'implode'
37 SEND_VAL '%0A'
38 INIT_FCALL 'pathify'
39 SEND_VAR !1
40 SEND_VAL '%2FBond4'
41 DO_FCALL 0 $11
42 SEND_VAR $11
43 DO_ICALL $12
44 ECHO $12
30 45 ECHO '%0A-------%0A'
31 46 INIT_FCALL 'implode'
47 SEND_VAL '%0A'
48 INIT_FCALL 'pathify'
49 SEND_VAR !1
50 SEND_VAL '%2FBond5'
51 DO_FCALL 0 $13
52 SEND_VAR $13
53 DO_ICALL $14
54 ECHO $14
55 > RETURN 1
Function pathify:
Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 77) Position 1 = 4, Position 2 = 25
Branch analysis from position: 4
2 jumps found. (Code = 78) Position 1 = 5, Position 2 = 25
Branch analysis from position: 5
2 jumps found. (Code = 43) Position 1 = 8, Position 2 = 17
Branch analysis from position: 8
1 jumps found. (Code = 42) Position 1 = 24
Branch analysis from position: 24
1 jumps found. (Code = 42) Position 1 = 4
Branch analysis from position: 4
Branch analysis from position: 17
1 jumps found. (Code = 42) Position 1 = 4
Branch analysis from position: 4
Branch analysis from position: 25
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 25
filename: /in/soqne
function name: pathify
number of ops: 28
compiled vars: !0 = $array, !1 = $path, !2 = $output, !3 = $v, !4 = $k
line #* E I O op fetch ext return operands
-------------------------------------------------------------------------------------
2 0 E > RECV !0
1 RECV !1
2 RECV_INIT !2 <array>
3 3 > FE_RESET_R $5 !0, ->25
4 > > FE_FETCH_R ~6 $5, !3, ->25
5 > ASSIGN !4, ~6
4 6 TYPE_CHECK 128 !3
7 > JMPZ ~8, ->17
5 8 > INIT_FCALL_BY_NAME 'pathify'
9 SEND_VAR_EX !3
10 ROPE_INIT 3 ~10 !1
11 ROPE_ADD 1 ~10 ~10, '%2F'
12 ROPE_END 2 ~9 ~10, !4
13 SEND_VAL_EX ~9
14 SEND_VAR_EX !2
15 DO_FCALL 0
4 16 > JMP ->24
7 17 > ROPE_INIT 5 ~15 !1
18 ROPE_ADD 1 ~15 ~15, '%2F'
19 ROPE_ADD 2 ~15 ~15, !4
20 ROPE_ADD 3 ~15 ~15, '+-+'
21 ROPE_END 4 ~14 ~15, !3
22 ASSIGN_DIM !2
23 OP_DATA ~14
3 24 > > JMP ->4
25 > FE_FREE $5
10 26 > RETURN !2
11 27* > RETURN null
End of function pathify
Generated using Vulcan Logic Dumper, using php 8.0.0