Finding entry points Branch analysis from position: 0 1 jumps found. (Code = 62) Position 1 = -2 filename: /in/soqne function name: (null) number of ops: 56 compiled vars: !0 = $json, !1 = $data line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 13 0 E > ASSIGN !0, '%7B%0A++++%22name%22%3A%7B%0A+++++++++%22first_name%22%3A%22James%22%2C%0A+++++++++%22last_name%22%3A%22Bond%22%0A+++++%7D%2C%0A+++++%22aliases%22%3A%5B%22007%22%2C%22Bond%22%5D%2C%0A+++++%22profiles%22%3A%5B%7B%220%22%3A%22unknown%22%7D%2C%22007%22%2C%7B%222%22%3A%22secret+agent%22%7D%5D%0A%7D' 22 1 INIT_FCALL 'json_decode' 2 SEND_VAR !0 3 SEND_VAL <true> 4 DO_ICALL $3 5 ASSIGN !1, $3 23 6 INIT_FCALL 'implode' 7 SEND_VAL '%0A' 8 INIT_FCALL 'pathify' 9 SEND_VAR !1 10 SEND_VAL '%2FBond1' 11 DO_FCALL 0 $5 12 SEND_VAR $5 13 DO_ICALL $6 14 ECHO $6 24 15 ECHO '%0A-------%0A' 25 16 INIT_FCALL 'implode' 17 SEND_VAL '%0A' 18 INIT_FCALL 'pathify' 19 SEND_VAL <array> 20 SEND_VAL '%2FBond2' 21 DO_FCALL 0 $7 22 SEND_VAR $7 23 DO_ICALL $8 24 ECHO $8 26 25 ECHO '%0A-------%0A' 27 26 INIT_FCALL 'implode' 27 SEND_VAL '%0A' 28 INIT_FCALL 'pathify' 29 SEND_VAL <array> 30 SEND_VAL '%2FBond3' 31 DO_FCALL 0 $9 32 SEND_VAR $9 33 DO_ICALL $10 34 ECHO $10 28 35 ECHO '%0A-------%0A' 29 36 INIT_FCALL 'implode' 37 SEND_VAL '%0A' 38 INIT_FCALL 'pathify' 39 SEND_VAR !1 40 SEND_VAL '%2FBond4' 41 DO_FCALL 0 $11 42 SEND_VAR $11 43 DO_ICALL $12 44 ECHO $12 30 45 ECHO '%0A-------%0A' 31 46 INIT_FCALL 'implode' 47 SEND_VAL '%0A' 48 INIT_FCALL 'pathify' 49 SEND_VAR !1 50 SEND_VAL '%2FBond5' 51 DO_FCALL 0 $13 52 SEND_VAR $13 53 DO_ICALL $14 54 ECHO $14 55 > RETURN 1 Function pathify: Finding entry points Branch analysis from position: 0 2 jumps found. (Code = 77) Position 1 = 4, Position 2 = 25 Branch analysis from position: 4 2 jumps found. (Code = 78) Position 1 = 5, Position 2 = 25 Branch analysis from position: 5 2 jumps found. (Code = 43) Position 1 = 8, Position 2 = 17 Branch analysis from position: 8 1 jumps found. (Code = 42) Position 1 = 24 Branch analysis from position: 24 1 jumps found. (Code = 42) Position 1 = 4 Branch analysis from position: 4 Branch analysis from position: 17 1 jumps found. (Code = 42) Position 1 = 4 Branch analysis from position: 4 Branch analysis from position: 25 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 25 filename: /in/soqne function name: pathify number of ops: 28 compiled vars: !0 = $array, !1 = $path, !2 = $output, !3 = $v, !4 = $k line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 2 0 E > RECV !0 1 RECV !1 2 RECV_INIT !2 <array> 3 3 > FE_RESET_R $5 !0, ->25 4 > > FE_FETCH_R ~6 $5, !3, ->25 5 > ASSIGN !4, ~6 4 6 TYPE_CHECK 128 !3 7 > JMPZ ~8, ->17 5 8 > INIT_FCALL_BY_NAME 'pathify' 9 SEND_VAR_EX !3 10 ROPE_INIT 3 ~10 !1 11 ROPE_ADD 1 ~10 ~10, '%2F' 12 ROPE_END 2 ~9 ~10, !4 13 SEND_VAL_EX ~9 14 SEND_VAR_EX !2 15 DO_FCALL 0 4 16 > JMP ->24 7 17 > ROPE_INIT 5 ~15 !1 18 ROPE_ADD 1 ~15 ~15, '%2F' 19 ROPE_ADD 2 ~15 ~15, !4 20 ROPE_ADD 3 ~15 ~15, '+-+' 21 ROPE_END 4 ~14 ~15, !3 22 ASSIGN_DIM !2 23 OP_DATA ~14 3 24 > > JMP ->4 25 > FE_FREE $5 10 26 > RETURN !2 11 27* > RETURN null End of function pathify
Generated using Vulcan Logic Dumper, using php 8.0.0