3v4l.org

run code in 300+ PHP versions simultaneously
<?php $options = [ 'cost' => 12, ]; $hash = password_hash(md5("tes"), CRYPT_BLOWFISH, $options); if (password_verify(md5("tes"), $hash)) { echo 'Password is valid!'; } else { echo 'Invalid password.'; }
Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 43) Position 1 = 18, Position 2 = 20
Branch analysis from position: 18
1 jumps found. (Code = 42) Position 1 = 21
Branch analysis from position: 21
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 20
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/4ho52
function name:  (null)
number of ops:  22
compiled vars:  !0 = $options, !1 = $hash
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    3     0  E >   ASSIGN                                                   !0, <array>
    7     1        INIT_FCALL                                               'password_hash'
          2        INIT_FCALL                                               'md5'
          3        SEND_VAL                                                 'tes'
          4        DO_ICALL                                         $3      
          5        SEND_VAR                                                 $3
          6        SEND_VAL                                                 1
          7        SEND_VAR                                                 !0
          8        DO_ICALL                                         $4      
          9        ASSIGN                                                   !1, $4
    9    10        INIT_FCALL                                               'password_verify'
         11        INIT_FCALL                                               'md5'
         12        SEND_VAL                                                 'tes'
         13        DO_ICALL                                         $6      
         14        SEND_VAR                                                 $6
         15        SEND_VAR                                                 !1
         16        DO_ICALL                                         $7      
         17      > JMPZ                                                     $7, ->20
   10    18    >   ECHO                                                     'Password+is+valid%21'
         19      > JMP                                                      ->21
   12    20    >   ECHO                                                     'Invalid+password.'
   13    21    > > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
150.13 ms | 1395 KiB | 19 Q