3v4l.org

run code in 300+ PHP versions simultaneously
<?php $passwordHash = password_hash("1234", PASSWORD_BCRYPT); if(password_verify("1234", $passwordHash)) { echo "Acces ok from hash"; echo "\n"; } if(password_verify("1234", '$2y$10$N/kamqB1rVzhAdGTSRpHSOAT.9WU3KygLu4DEUAQxXwDNA8Y9.b7C')) { echo "Acces ici aussi"; }else{ echo "403 from database!"; }
Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 43) Position 1 = 10, Position 2 = 12
Branch analysis from position: 10
2 jumps found. (Code = 43) Position 1 = 17, Position 2 = 19
Branch analysis from position: 17
1 jumps found. (Code = 42) Position 1 = 20
Branch analysis from position: 20
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 19
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 12
filename:       /in/8pgt6
function name:  (null)
number of ops:  21
compiled vars:  !0 = $passwordHash
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    4     0  E >   INIT_FCALL                                               'password_hash'
          1        SEND_VAL                                                 '1234'
          2        SEND_VAL                                                 '2y'
          3        DO_ICALL                                         $1      
          4        ASSIGN                                                   !0, $1
    6     5        INIT_FCALL                                               'password_verify'
          6        SEND_VAL                                                 '1234'
          7        SEND_VAR                                                 !0
          8        DO_ICALL                                         $3      
          9      > JMPZ                                                     $3, ->12
    8    10    >   ECHO                                                     'Acces+ok+from+hash'
    9    11        ECHO                                                     '%0A'
   12    12    >   INIT_FCALL                                               'password_verify'
         13        SEND_VAL                                                 '1234'
         14        SEND_VAL                                                 '%242y%2410%24N%2FkamqB1rVzhAdGTSRpHSOAT.9WU3KygLu4DEUAQxXwDNA8Y9.b7C'
         15        DO_ICALL                                         $4      
         16      > JMPZ                                                     $4, ->19
   14    17    >   ECHO                                                     'Acces+ici+aussi'
         18      > JMP                                                      ->20
   17    19    >   ECHO                                                     '403+from+database%21'
   18    20    > > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
149.8 ms | 1395 KiB | 17 Q