Finding entry points Branch analysis from position: 0 2 jumps found. (Code = 43) Position 1 = 21, Position 2 = 23 Branch analysis from position: 21 1 jumps found. (Code = 42) Position 1 = 40 Branch analysis from position: 40 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 23 2 jumps found. (Code = 77) Position 1 = 25, Position 2 = 38 Branch analysis from position: 25 2 jumps found. (Code = 78) Position 1 = 26, Position 2 = 38 Branch analysis from position: 26 2 jumps found. (Code = 46) Position 1 = 29, Position 2 = 32 Branch analysis from position: 29 2 jumps found. (Code = 43) Position 1 = 33, Position 2 = 34 Branch analysis from position: 33 1 jumps found. (Code = 42) Position 1 = 25 Branch analysis from position: 25 Branch analysis from position: 34 Branch analysis from position: 32 Branch analysis from position: 38 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 38 filename: /in/uI4VA function name: (null) number of ops: 42 compiled vars: !0 = $url, !1 = $dir, !2 = $max, !3 = $images, !4 = $path, !5 = $img, !6 = $i line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 3 0 E > ASSIGN !0, 'http%3A%2F%2Flocalhost%2Fimg' 4 1 ASSIGN !1, 'C%3A%5CProgram+Files%5CApache+Group%5CApache2%5Chtdocs%5Cimg' 5 2 ASSIGN !2, 5 7 3 INIT_FCALL 'preg_grep' 4 SEND_VAL '%2F%5C.%28%3F%3Ajpe%3Fg%7Cgif%7Cpng%29%5Cz%2Fi' 5 INIT_FCALL 'scandir' 6 SEND_VAR !1 7 DO_ICALL $10 8 SEND_VAR $10 9 DO_ICALL $11 10 ASSIGN !3, $11 8 11 INIT_FCALL 'array_walk' 12 SEND_REF !3 13 DECLARE_LAMBDA_FUNCTION '%00%7Bclosure%7D%2Fin%2FuI4VA%3A8%240' 10 14 SEND_VAL ~13 15 DO_ICALL 13 16 ECHO '%3C%21DOCTYPE+html%3E%0A%3Chtml%3E%0A%3Chead%3E%0A%3Cmeta+charset%3D%22UTF-8%22%3E%0A%3C%2Fhead%3E%0A%3Cbody%3E%0A%3Ch1%3E' 19 17 ECHO !4 18 ECHO '%E5%86%85%E3%81%AE%E7%94%BB%E5%83%8F%E4%B8%80%E8%A6%A7%3C%2Fh1%3E%0A' 20 19 BOOL_NOT ~15 !3 20 > JMPZ ~15, ->23 21 21 > ECHO '%3Cp%3E%E8%A1%A8%E7%A4%BA%E3%81%99%E3%82%8B%E7%94%BB%E5%83%8F%E3%81%AF%E3%81%82%E3%82%8A%E3%81%BE%E3%81%9B%E3%82%93%3C%2Fp%3E%0A' 22 > JMP ->40 23 23 > ECHO '%3Ctable%3E%0A%3Ctr%3E%0A' 25 24 > FE_RESET_R $16 !3, ->38 25 > > FE_FETCH_R ~17 $16, !5, ->38 26 > ASSIGN !6, ~17 26 27 IS_NOT_IDENTICAL ~19 !6, 0 28 > JMPZ_EX ~19 ~19, ->32 29 > MOD ~20 !6, !2 30 IS_IDENTICAL ~21 ~20, 0 31 BOOL ~19 ~21 32 > > JMPZ ~19, ->34 27 33 > ECHO '%3C%2Ftr%3E%0A%3Ctr%3E%0A' 30 34 > ECHO '%3Ctd%3E%3Cimg+src%3D%22' 35 ECHO !5 36 ECHO '%22%3E%3C%2Ftd%3E%0A' 25 37 > JMP ->25 38 > FE_FREE $16 32 39 ECHO '%3C%2Ftr%3E%0A%3C%2Ftable%3E%0A' 35 40 > ECHO '%3C%2Fbody%3E%0A%3C%2Fhtml%3E' 36 41 > RETURN 1 Function %00%7Bclosure%7D%2Fin%2FuI4VA%3A8%240: Finding entry points Branch analysis from position: 0 1 jumps found. (Code = 62) Position 1 = -2 filename: /in/uI4VA function name: {closure} number of ops: 4 compiled vars: !0 = $v, !1 = $url line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 8 0 E > RECV !0 9 1 CONCAT ~2 !1, !0 2 ASSIGN !0, ~2 10 3 > RETURN null End of function %00%7Bclosure%7D%2Fin%2FuI4VA%3A8%240
Generated using Vulcan Logic Dumper, using php 8.0.0