3v4l.org

run code in 300+ PHP versions simultaneously
<?php if (CRYPT_BLOWFISH == 1) { echo 'Blowfish: ' . crypt('ohgakiyasuo','$2y$12$usesomesillystringforsalt$') . "\n"; } if (CRYPT_SHA256 == 1) { echo 'SHA-256: ' . crypt('ohgakiyasuo','$5$rounds=9000$usesomesillystringforsalt$') . "\n"; } if (CRYPT_SHA512 == 1) { echo 'SHA-512: ' . crypt('ohgakiyasuo','$6$rounds=9000$usesomesillystringforsalt$') . "\n"; } // 無効な文字や空文字を指定した場合。エラー文字列が返る echo 'Blowfish: ' . crypt('ohgakiyasuo', '$2a$07$!"#$%&\'()0=~!"#$%&\'()0!"$') . "\n"; echo 'Blowfish: ' . crypt('ohgakiyasuo', '$2a$07$') . "\n"; // roundsでなくroundと間違っている。"round=9000"がソルトとして扱われる。 echo 'SHA-512: ' . crypt('ohgakiyasuo', '$6$round=9000$usesomesillystringforsalt$') . "\n"; // ソルト文字列に$が含まれていると、そこまでがソルトとなる echo 'SHA-512: ' . crypt('ohgakiyasuo', '$6$rounds=9000$usesome$sillystringforsalt$') . "\n"; // ソルト文字列なしでも利用可能(非推奨) echo 'SHA-512: ' . crypt('ohgakiyasuo', '$6$'). "\n";
Output for git.master, git.master_jit, rfc.property-hooks
Blowfish: $2y$12$usesomesillystringforeXpSZPDV.MKc45652uPFKQUBc82xLwsi SHA-256: $5$rounds=9000$usesomesillystri$nYi5X3hJqMJw6IipB/iRkgVBnQFtuOkffEmvtEgXAqD SHA-512: $6$rounds=9000$usesomesillystri$Ur2afDSVdPdZBbNjNsjYjhWmyB49Acr1xM8PEKCtOE2HHpmBo2J3Dw1Dk.sfFp/AL2b2zVyW2M1mqnibxT0KL/ Blowfish: *0 Blowfish: *0 SHA-512: $6$round=9000$/8BLDWSiCWHmsoRpMk609m2sgtUW.NDC22uljrQq7Tw3Mlgnm0RQVgqElLJv/cUWpmSOAoh6dGIWuCdp49RO10 SHA-512: $6$rounds=9000$usesome$4wPfUcghRFMHh5YgvkBzq1kol0Z8SSPUkfe9u2rrRFrrxFp/KJLSl7norbGlfWmF6atMqQAeGds6Pzs/NA5HJ1 SHA-512: $6$$rska/19otJRaa8sktDzgZUtwH9DDlTs1vbMWyzWaQ4XKYKeufK6YnpfzOxHjSgDGZMqE.Md/QUfcG6WVwMoB4.

This tab shows result from various feature-branches currently under review by the php developers. Contact me to have additional branches featured.

Active branches

Archived branches

Once feature-branches are merged or declined, they are no longer available. Their functionality (when merged) can be viewed from the main output page


preferences:
52.17 ms | 402 KiB | 8 Q