3v4l.org

run code in 200+ php & hhvm versions
<?php $passwordHash = password_hash("1234", PASSWORD_BCRYPT); if(password_verify("1234", $passwordHash)) { echo "Acces ok from hash"; echo "\n"; } if(password_verify("1234", '$2y$10$N/kamqB1rVzhAdGTSRpHSOAT.9WU3KygLu4DEUAQxXwDNA8Y9.b7C')) { echo "Acces ici aussi"; }else{ echo "403 from database!"; }
based on H17ih
Finding entry points
Branch analysis from position: 0
Jump found. (Code = 43) Position 1 = 10, Position 2 = 12
Branch analysis from position: 10
Jump found. (Code = 43) Position 1 = 17, Position 2 = 19
Branch analysis from position: 17
Jump found. (Code = 42) Position 1 = 20
Branch analysis from position: 20
Jump found. (Code = 62) Position 1 = -2
Branch analysis from position: 19
Jump found. (Code = 62) Position 1 = -2
Branch analysis from position: 12
filename:       /in/8pgt6
function name:  (null)
number of ops:  21
compiled vars:  !0 = $passwordHash
line     #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
   4     0  E >   INIT_FCALL                                               'password_hash'
         1        SEND_VAL                                                 '1234'
         2        SEND_VAL                                                 1
         3        DO_ICALL                                         $1      
         4        ASSIGN                                                   !0, $1
   6     5        INIT_FCALL                                               'password_verify'
         6        SEND_VAL                                                 '1234'
         7        SEND_VAR                                                 !0
         8        DO_ICALL                                         $3      
         9      > JMPZ                                                     $3, ->12
   8    10    >   ECHO                                                     'Acces+ok+from+hash'
   9    11        ECHO                                                     '%0A'
  12    12    >   INIT_FCALL                                               'password_verify'
        13        SEND_VAL                                                 '1234'
        14        SEND_VAL                                                 '%242y%2410%24N%2FkamqB1rVzhAdGTSRpHSOAT.9WU3KygLu4DEUAQxXwDNA8Y9.b7C'
        15        DO_ICALL                                         $4      
        16      > JMPZ                                                     $4, ->19
  14    17    >   ECHO                                                     'Acces+ici+aussi'
        18      > JMP                                                      ->20
  17    19    >   ECHO                                                     '403+from+database%21'
  18    20    > > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 7.3.0