3v4l.org

run code in 300+ PHP versions simultaneously
<?php print_r(explode('$', sodium_crypto_pwhash_str('string',SODIUM_CRYPTO_PWHASH_OPSLIMIT_INTERACTIVE, SODIUM_CRYPTO_PWHASH_MEMLIMIT_INTERACTIVE)));
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/4adjf
function name:  (null)
number of ops:  15
compiled vars:  none
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    3     0  E >   INIT_FCALL                                               'print_r'
          1        INIT_FCALL                                               'explode'
          2        SEND_VAL                                                 '%24'
          3        INIT_FCALL_BY_NAME                                       'sodium_crypto_pwhash_str'
          4        SEND_VAL_EX                                              'string'
          5        FETCH_CONSTANT                                   ~0      'SODIUM_CRYPTO_PWHASH_OPSLIMIT_INTERACTIVE'
          6        SEND_VAL_EX                                              ~0
          7        FETCH_CONSTANT                                   ~1      'SODIUM_CRYPTO_PWHASH_MEMLIMIT_INTERACTIVE'
          8        SEND_VAL_EX                                              ~1
          9        DO_FCALL                                      0  $2      
         10        SEND_VAR                                                 $2
         11        DO_ICALL                                         $3      
         12        SEND_VAR                                                 $3
         13        DO_ICALL                                                 
         14      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
16.3 ms | 410 KiB | 7 Q