3v4l.org

run code in 300+ PHP versions simultaneously
<?php // username: admin $password = 12345678; // hashed password: $2y$12$$$$$$$$$$$$$$$$$$$$$$.ibwcWrMlgLR7y6B62/Vc8Dc54kecHHe$1$ZQhX9D2d$RexVJ.y2KWpfxMyY0tN9E1 $salt = 'HJsZ4yBWNbGQCw1Yi-7rGBunXym7AEIFatIHhaK_fQgY6I1ecqAEs7eAmJM88Zdn5VpdrKie2CN39~PjqSb3yoPCCzl4q8'; $vsalt = 'S2qXSXQUc-'; function hashing($password ,$salt ,$vsalt){ $check1 = crypt($password.$salt,'$2y$12$'.$vsalt); $check2 = crypt($password.$salt,$vsalt); //password will be: $check1.$check2 return($check1.' '.$check2); } var_dump(hashing(12345678, $salt, $vsalt), hashing('12345678', $salt, $vsalt)); //password: 12345678 // hashed password: *0S2k0u9.1hnFr. $salt = 'HJsZ4yBWNbGQCw1Yi-7rGBunXym7AEIFatIHhaK_fQgY6I1ecqAEs7eAmJM88Zdn5VpdrKie2CN39~PjqSb3yoPCCzl4q8'; $vsalt = 'S2qXSXQUc-'; var_dump(hashing(12345678, $salt, $vsalt), hashing('12345678', $salt, $vsalt));
Output for 5.3.7 - 5.3.29, 5.4.0 - 5.4.45, 5.5.0 - 5.5.38, 5.6.0 - 5.6.40, 7.0.0 - 7.0.33, 7.1.0 - 7.1.33, 7.2.0 - 7.2.33, 7.3.0 - 7.3.33, 7.4.0 - 7.4.33, 8.0.0 - 8.0.30, 8.1.0 - 8.1.28, 8.2.0 - 8.2.18, 8.3.0 - 8.3.6
string(16) "*0 S2k0u9.1hnFr." string(16) "*0 S2k0u9.1hnFr." string(16) "*0 S2k0u9.1hnFr." string(16) "*0 S2k0u9.1hnFr."
Output for 5.3.2 - 5.3.6
string(27) "$2lH9Bbg1vo/g S2k0u9.1hnFr." string(27) "$2lH9Bbg1vo/g S2k0u9.1hnFr." string(27) "$2lH9Bbg1vo/g S2k0u9.1hnFr." string(27) "$2lH9Bbg1vo/g S2k0u9.1hnFr."
Output for 5.3.0 - 5.3.1
string(27) "$26Y1GW.Ks5mY S2k0u9.1hnFr." string(27) "$26Y1GW.Ks5mY S2k0u9.1hnFr." string(27) "$26Y1GW.Ks5mY S2k0u9.1hnFr." string(27) "$26Y1GW.Ks5mY S2k0u9.1hnFr."
Output for 4.3.0 - 4.3.11, 4.4.0 - 4.4.9, 5.0.0 - 5.0.5, 5.1.0 - 5.1.6, 5.2.0 - 5.2.17

Process exited with code 139.

preferences:
362.11 ms | 402 KiB | 459 Q